Article Details
Scrape Timestamp (UTC): 2024-04-24 04:54:00.549
Source: https://thehackernews.com/2024/04/coralraider-malware-campaign-exploits.html
Original Article Text
Click to Toggle View
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers. A new ongoing malware campaign has been observed distributing three different stealers, such as CryptBot, LummaC2, and Rhadamanthys hosted on Content Delivery Network (CDN) cache domains since at least February 2024. Cisco Talos has attributed the activity with moderate confidence to a threat actor tracked as CoralRaider, a suspected Vietnamese-origin group that came to light earlier this month. This assessment is based on "several overlaps in tactics, techniques, and procedures (TTPs) of CoralRaider's Rotbot campaign, including the initial attack vector of the Windows Shortcut file, intermediate PowerShell decryptor and payload download scripts, the FoDHelper technique used to bypass User Access Controls (UAC) of the victim machine," the company said. Targets of the campaign span various business verticals across geographies, including the U.S., Nigeria, Pakistan, Ecuador, Germany, Egypt, the U.K., Poland, the Philippines, Norway, Japan, Syria, and Turkey. Attack chains involve users downloading files masquerading as movie files via a web browser, raising the possibility of a large-scale attack. "This threat actor is using a Content Delivery Network (CDN) cache to store the malicious files on their network edge host in this campaign, avoiding request delay," Talos researchers Joey Chen, Chetan Raghuprasad, and Alex Karkins said. "The actor is using the CDN cache as a download server to deceive network defenders." The initial access vector for the drive-by downloads is suspected to be phishing emails, using them as a conduit to propagate booby-trapped links pointing to ZIP archives containing a Windows shortcut (LNK) file. The shortcut file, in turn, runs a PowerShell script to fetch a next-stage HTML application (HTA) payload hosted on the CDN cache, which subsequently runs Javascript code to launch an embedded PowerShell loader that takes steps to fly under the radar and ultimately downloads and runs one of the three stealer malware. The modular PowerShell loader script is designed to bypass the User Access Controls (UAC) in the victim's machine using a known technique called FodHelper, which has also been put to use by Vietnamese threat actors linked to another stealer known as NodeStealer that's capable of stealing Facebook account data. The stealer malware, regardless of what's deployed, grabs victims' information, such as system and browser data, credentials, cryptocurrency wallets, and financial information. What's notable about the campaign is that it utilizes an updated version of CryptBot that packs in new anti-analysis techniques and also captures password manager application databases and authenticator application information. Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. How to Update and Automate Outdated Security Processes Download the eBook for step-by-step guidance on how to update your security processes as your business grows.
Daily Brief Summary
A new malware campaign, dubbed CoralRaider, is distributing info-stealing malware through Content Delivery Network (CDN) caches.
Threat actor suspected of Vietnamese origin utilizes three types of stealers: CryptBot, LummaC2, and Rhadamanthys, with operations noted from at least February 2024.
Cisco Talos researchers identified tactics including the use of Windows Shortcut files, PowerShell scripts, and the FoDHelper technique for UAC bypass.
The targeted campaign impacts diverse business sectors across multiple countries such as the U.S., U.K., Germany, Japan, and others.
Attack vectors include deceptive downloads of movie files which actually contain malicious software, hinting at a widespread attack approach.
The malware utilizes sophisticated methods such as updated CryptBot versions with advanced anti-analysis capabilities targeting data like credentials and financial information.
Initial compromise is often achieved via phishing emails that guide victims to download malicious ZIP files containing dangerous LNK files.