HomeCII/OTTrojan.AutoIt.1443 Infects 28,000 Users through Gaming Cheats and Office Software

Trojan.AutoIt.1443 Infects 28,000 Users through Gaming Cheats and Office Software

Published on

spot_img

In a recent cybersecurity development, a new threat has emerged in the form of Trojan.AutoIt.1443, which has targeted approximately 28,000 users in Russia and neighbouring countries. This sophisticated malware is spreading through deceptive means, such as game cheats and office tools, and is designed to bypass detection by antivirus programs.

The discovery of this cyber attack was made by cybersecurity researchers at Doctor Web, also known as Dr.Web. The malicious campaign utilizes trojans that masquerade as legitimate applications like office programs, game cheats, and online trading bots. Once these trojans are downloaded and installed by unsuspecting users, the malware is unleashed on their systems, unleashing a wave of cryptomining and cryptostealing activities.

One of the key aspects of this attack is how the malware is delivered and executed on the victim’s machine. Users are enticed to click on fraudulent links shared on platforms like GitHub and YouTube, leading them to download password-protected archives that can evade basic antivirus scans. By entering the password, users unwittingly initiate the installation of the malware, which then proceeds to carry out its malicious activities.

Dr.Web’s technical analysis of the infection reveals the intricate components that allow the malware to operate stealthily on infected systems. Legitimate programs like UnRar.exe are exploited, along with malicious scripts like Iun.bat and Uun.bat, to set up and execute the malware. Additionally, hidden files named ShellExt.dll and UTShellExt.dll play a crucial role in disguising the malicious script as a regular system tool, using the AutoIt programming language to avoid detection.

Once activated, the malware scans for debugging tools and establishes network access through the Ncat utility, further securing its presence within the system. By manipulating the system registry and leveraging the Image File Execution Options (IFEO) technique, the malware ensures persistence and control over critical system functions.

The malware’s operations encompass two main malicious tasks: cryptomining and cryptostealing. Through files like DeviceId.dll and 7zxa.dll, the malware installs cryptomining software like SilentCryptoMiner and deploys a “clipper” tool to divert cryptocurrency funds by manipulating clipboard data. This insidious technique has allowed cybercriminals to steal over $6,000 from unsuspecting users.

The impact of this campaign has been significant, affecting over 28,000 users primarily in Russia and neighbouring countries. To prevent falling victim to such threats, users are advised to use reliable antivirus solutions, download software from trusted sources, regularly update security software, and avoid pirated programs that often come bundled with malicious files.

As cyber attacks continue to evolve, it is crucial for users to stay vigilant and adhere to safe computing practices to safeguard their systems. By staying informed and proactive in implementing security measures, users can mitigate the risks posed by advanced malware threats like Trojan.AutoIt.1443. Stay tuned to Hackread.com for further updates and insights into cybersecurity developments.

In related topics, other recent malware campaigns targeting unsuspecting users have been highlighted, underscoring the importance of staying informed and proactive in defending against evolving cyber threats. References to campaigns like Fake League of Legends Download Ads Drop Lumma Stealer, Global malspam targeting hotels with Redline and Vidar stealers, and Fake Windows site spreading Redline malware as a Windows 11 upgrade serve as cautionary tales in the ever-changing landscape of cybersecurity threats.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...