Article Details

Scrape Timestamp (UTC): 2024-01-16 07:18:38.641

Source: https://thehackernews.com/2024/01/hackers-weaponize-windows-flaw-to.html

Original Article Text

Click to Toggle View

Hackers Weaponize Windows Flaw to Deploy Crypto-Siphoning Phemedrone Stealer. Threat actors have been observed leveraging a now-patched security flaw in Microsoft Windows to deploy an open-source information stealer called Phemedrone Stealer. "Phemedrone targets web browsers and data from cryptocurrency wallets and messaging apps such as Telegram, Steam, and Discord," Trend Micro researchers Peter Girnus, Aliakbar Zahravi, and Simon Zuckerbraun said. "It also takes screenshots and gathers system information regarding hardware, location, and operating system details. The stolen data is then sent to the attackers via Telegram or their command-and-control (C&C) server." The attacks leverage CVE-2023-36025 (CVSS score: 8.8), a security bypass vulnerability in Windows SmartScreen, that could be exploited by tricking a user into clicking on a specially crafted Internet Shortcut (.URL) or a hyperlink pointing to an Internet Shortcut file. The actively-exploited shortcoming was addressed by Microsoft as part of its November 2023 Patch Tuesday updates. The infection process involves the threat actor hosting malicious Internet Shortcut files on Discord or cloud services like FileTransfer.io, with the links also masked using URL shorteners such as Short URL. The execution of the booby-trapped .URL file allows it to connect to an actor-controlled server and execute a control panel (.CPL) file in a manner that circumvents Windows Defender SmartScreen by taking advantage of CVE-2023-36025. "When the malicious .CPL file is executed through the Windows Control Panel process binary, it in turn calls rundll32.exe to execute the DLL," the researchers said. "This malicious DLL acts as a loader that then calls on Windows PowerShell to download and execute the next stage of the attack, hosted on GitHub." The follow-on payload is a PowerShell loader ("DATA3.txt") that acts as a launchpad for Donut, an open-source shellcode loader that decrypts and executes Phemedrone Stealer. Written in C#, Phemedrone Stealer is actively maintained by its developers on GitHub and Telegram, facilitating the theft of sensitive information from compromised systems. The development is once again a sign that threat actors are getting increasingly flexible and quickly adapting their attack chains to capitalize on newly disclosed exploits and inflict maximum damage. "Despite having been patched, threat actors continue to find ways to exploit CVE-2023-36025 and evade Windows Defender SmartScreen protections to infect users with a plethora of malware types, including ransomware and stealers like Phemedrone Stealer," the researchers said. Report: Unveiling the Threat of Malicious Browser Extensions Download the Report to learn the Risks of Malicious Extensions and How to Mitigate Them. Firewalls vs. Zero Trust: Minimize Your Attack Surface Learn latest trends in the attack landscape, attacker strategies, and how to implement Zero Trust Security.

Daily Brief Summary

MALWARE // Phemedrone Stealer Malware Exploits Patched Windows Vulnerability

Cybercriminals are exploiting a previously patched Windows security flaw to distribute Phemedrone Stealer, an information-stealing malware.

Phemedrone Stealer targets web browsers, cryptocurrency wallets, and messaging apps, and can also take screenshots and gather system information.

The hackers send the collected data back to themselves using Telegram or their command-and-control server.

The vulnerability, identified as CVE-2023-36025, affects Windows SmartScreen and can be exploited via malicious Internet Shortcut files or hyperlinks.

Attackers are distributing the malware through Discord, cloud services, and URL shorteners, despite Microsoft's November 2023 patch.

The malware uses a complex infection chain, including a malicious Windows Control Panel file, a PowerShell loader, and an open-source shellcode loader called Donut.

Phemedrone Stealer is maintained on GitHub and Telegram, indicating a support network for ongoing malware development and distribution.

The misuse of CVE-2023-36025, even after it's been patched, demonstrates the persistence of threat actors in using sophisticated evasion methods to spread malware.