HomeCII/OTRomCom Malware Reappears with SnipBot Variant

RomCom Malware Reappears with SnipBot Variant

Published on

spot_img

The recent resurgence of the RomCom cyber-espionage malware has researchers on high alert as a new variant of the malicious software has been discovered. Known as SnipBot, this malware is the latest iteration of the RomCom family, which targeted the Ukraine military and its supporters in a rampage last year. The new variant is more sophisticated, utilizing valid code-signing certificates to avoid detection while carrying out nefarious activities on victims’ systems in a multistage attack.

According to researchers at Palo Alto’s Unit 42, SnipBot has been spreading since December and builds upon the techniques seen in previous versions of RomCom. This latest variant combines elements from RomCom 3.0 and RomCom 4.0, making it version 5.0 of the original RomCom remote access Trojan (RAT) family. The malware is designed to execute commands, download additional malicious files, and gather intelligence from targeted organizations, which include those in sectors such as IT services, legal, and agriculture.

Previous iterations of RomCom included ransomware payloads, but Unit 42 believes that the attackers behind the malware have shifted their focus exclusively to intelligence-gathering. This change in tactics has made it challenging to discern the attackers’ intentions given the wide range of targeted victims. Despite this shift, the threat posed by RomCom and its variants remains ever-present, with the threat actor engaging in various nefarious activities to support their intelligence-gathering operations.

The infection vector of SnipBot involves the delivery of the malware through phishing emails containing either an executable file disguised as a PDF or an actual PDF file that leads to an executable. The malware is designed to run commands on victims’ systems, download additional modules, and establish a foothold for further malicious activities. The use of valid code-signing certificates in the malware’s downloader suggests that the threat actors may have stolen or obtained them through fraudulent means.

Once installed on a victim’s system, SnipBot contacts command-and-control (C2) domains to retrieve additional payloads and establish communication with the attackers. These payloads provide the attacker with various capabilities, including spyware functionality, command-line access, and the ability to upload and download files from the victim’s system. Post-infection activities observed by Unit 42 include attempts to gather information about the victim’s internal network and exfiltrate sensitive data to external servers controlled by the attackers.

As the threat landscape continues to evolve, organizations are urged to remain vigilant and adopt advanced security measures to protect their systems and data from cyberthreats like RomCom. The Computer Emergency Response Team of Ukraine (CERT-UA) has also issued warnings about the threat posed by RomCom and advised organizations to be cautious when dealing with emails from unknown senders, especially those purporting to be government officials. By staying informed and implementing robust cybersecurity practices, organizations can defend against sophisticated threats like RomCom and safeguard their sensitive information.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...