Article Details
Scrape Timestamp (UTC): 2024-02-26 15:00:33.891
Source: https://thehackernews.com/2024/02/new-idat-loader-attacks-using.html
Original Article Text
Click to Toggle View
New IDAT Loader Attacks Using Steganography to Deploy Remcos RAT. Ukrainian entities based in Finland have been targeted as part of a malicious campaign distributing a commercial remote access trojan known as Remcos RAT using a malware loader called IDAT Loader. The attack has been attributed to a threat actor tracked by the Computer Emergency Response Team of Ukraine (CERT-UA) under the moniker UAC-0184. "The attack, as part of the IDAT Loader, used steganography as a technique," Morphisec researcher Michael Dereviashkin said in a report shared with The Hacker News. "While steganographic, or 'Stego' techniques are well-known, it is important to understand their roles in defense evasion, to better understand how to defend against such tactics." IDAT Loader, which overlaps with another loader family called Hijack Loader, has been used to serve additional payloads like DanaBot, SystemBC, and RedLine Stealer in recent months. It has also been used by a threat actor tracked as TA544 to distribute Remcos RAT and SystemBC via phishing attacks. The phishing campaign – first disclosed by CERT-UA in early January 2024 – entail using war-themed lures as a starting point to kick-start an infection chain that leads to the deployment of IDAT Loader, which, in turn, uses an embedded steganographic PNG to locate and extract Remcos RAT. The development comes as CERT-UA revealed that defense forces in the country have been targeted via the Signal instant messaging app to distribute a booby-trapped Microsoft Excel document that executes COOKBOX, a PowerShell-based malware that's capable of loading and executing cmdlets. CERT-UA has attributed the activity to a cluster dubbed UAC-0149. It also follows the resurgence of malware campaigns propagating PikaBot malware since February 8, 2024, using an updated variant that appears to be currently under active development. "This version of the PIKABOT loader uses a new unpacking method and heavy obfuscation," Elastic Security Labs said. "The core module has added a new string decryption implementation, changes to obfuscation functionality, and various other modifications." ⚡ Free Risk Assessment from Vanta Generate a gap assessment of your security and compliance posture, discover shadow IT, and more.
Daily Brief Summary
Ukrainian organizations in Finland have been targeted with Remcos RAT, delivered by the IDAT Loader malware.
The attack involved innovative use of steganography to conceal and deploy the harmful software.
The IDAT Loader is linked with Hijack Loader and has been observed distributing other payloads like DanaBot, SystemBC, and RedLine Stealer.
A phishing campaign initially identified by CERT-UA employed war-themed lures to initiate the attack chain leading to Remcos RAT infection.
The IDAT Loader hides the RAT within a PNG image using steganography, demonstrating an advanced technique for evasion.
In a separate incident, Ukrainian defense forces were targeted with COOKBOX malware via Signal, linked to UAC-0149 group.
The PikaBot malware has reemerged with new obfuscation methods and is under active development, indicating a growing sophistication among threat actors.