HomeCyber BalkansNortex Scam Campaign - Malware

Nortex Scam Campaign – Malware

Published on

spot_img

The Nortex MP4 campaign, spearheaded by the cybercriminal group Marko Polo (MP4), has emerged as a sophisticated operation utilizing social engineering tactics to distribute malicious software disguised as a legitimate Web3 application. Positioned as an all-in-one decentralized platform for Web3 enthusiasts, Nortex claims to offer messaging services, productivity software, and social networking features. However, the reality behind Nortex is far from its promises, as it acts as a facade for malware distribution aimed at compromising unsuspecting users’ systems.

The core of the Nortex scam revolves around a well-planned process that begins with false advertisements across various platforms, including social media, enticing individuals to download the Nortex client. Once the victim installs the software, it proceeds to download and execute various forms of malware based on the victim’s operating system. Windows OS users are targeted with the HijackLoader and Stealc malware, designed to extract sensitive information like login credentials and cryptocurrency wallets. On the other hand, macOS users are confronted with the AMOS malware, a malicious entity associated with previous operations by Marko Polo. These malware strains enable cybercriminals to gain remote access to infected machines, facilitating data exfiltration and further malicious activities.

The operational tactics of the Nortex campaign involve an initial social engineering phase, where attackers leverage fake advertisements and fraudulent job offers to draw victims to the malicious website, nortexapp.xyz. Once on the site, victims are prompted to download the Nortex client, falsely presented as a legitimate Web3 application. The Windows OS version of the client is disseminated via Dropbox and installs the Nortex.exe file containing the HijackLoader and Stealc malware. HijackLoader assists in injecting additional payloads, while Stealc focuses on pilfering sensitive information such as credentials, banking details, and cryptocurrency wallets.

Similarly, macOS users are deceived during the installation process when they are prompted to download a file named NortexApp.dmg, housing the AMOS malware. This malicious software grants remote access to the infected system, enabling attackers to steal data and maintain control over compromised machines. The AMOS malware further communicates with a Marko Polo command-and-control (C2) server, giving attackers the power to issue commands and manipulate infected systems remotely.

A pivotal factor contributing to the success of the Nortex campaign is the utilization of cloud-based hosting services like Dropbox for delivering Windows OS malware and Cloudflare for domain hosting. These services are commonly associated with legitimate use, making it challenging to detect malicious activities. Additionally, the campaign leverages different domains affiliated with Marko Polo for fetching malware configuration files, evading detection with dynamic IP addresses and constantly changing domains. The adeptness of the Marko Polo group is evident in their agile infrastructure movements when flagged, exemplified by the migration of the macOS version of Nortex across various domains.

In conclusion, the technical intricacies of the Nortex MP4 campaign highlight the evolving sophistication of modern cybercriminal groups in executing malicious activities. By exploiting trusted cloud services, deploying advanced social engineering approaches, and employing agile infrastructure tactics, Marko Polo succeeds in disseminating malware while eluding traditional cybersecurity measures. Understanding these operational nuances is imperative in defending against such threats as cybercrime continues to evolve with increasing complexity.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...