Article Details

Scrape Timestamp (UTC): 2024-06-20 06:35:21.045

Source: https://thehackernews.com/2024/06/experts-uncover-new-evasive-squidloader.html

Original Article Text

Click to Toggle View

Experts Uncover New Evasive SquidLoader Malware Targeting Chinese Organizations. Cybersecurity researchers have uncovered a new evasive malware loader named SquidLoader that spreads via phishing campaigns targeting Chinese organizations. AT&T LevelBlue Labs, which first observed the malware in late April 2024, said it incorporates features that are designed to thwart static and dynamic analysis and ultimately evade detection. Attack chains leverage phishing emails that come with attachments that masquerade as Microsoft Word documents, but, in reality, are binaries that pave the way for the execution of the malware, which is then used to fetch second-stage shellcode payloads from a remote server, including Cobalt Strike. "These loaders feature heavy evasion and decoy mechanisms which help them remain undetected while also hindering analysis," security researcher Fernando Dominguez said. "The shellcode that is delivered is also loaded in the same loader process, likely to avoid writing the payload to disk and thus risk being detected." Some of the defensive evasion techniques adopted by SquidLoader encompass the use of encrypted code segments, pointless code that remains unused, Control Flow Graph (CFG) obfuscation, debugger detection, and performing direct syscalls instead of calling Windows NT APIs. Loader malware has become a popular commodity in the criminal underground for threat actors looking to deliver and launch additional payloads to compromised hosts, while bypassing antivirus defenses and other security measures. Last year, Aon's Stroz Friedberg incident detailed a loader known as Taurus Loader that has been observed distributing the Taurus information stealer as well as AgentVX, a trojan with capabilities to execute more malware and set up persistence using Windows Registry changes, and gather data. The development comes as a new in-depth analysis of a malware loader and backdoor referred to as PikaBot has highlighted that it continues to be actively developed by its developers since its emergence in February 2023. "The malware employs advanced anti-analysis techniques to evade detection and harden analysis, including system checks, indirect syscalls, encryption of next-stage and strings, and dynamic API resolution," Sekoia said. "The recent updates to the malware have further enhanced its capabilities, making it even more challenging to detect and mitigate." It also follows findings from BitSight that the infrastructure related to another loader malware called Latrodectus has gone offline in the wake of a law enforcement effort dubbed Operation Endgame that saw over 100 botnet servers, including those associated with IcedID, SystemBC, PikaBot, SmokeLoader, Bumblebee, and TrickBot, dismantled. The cybersecurity company said it observed nearly 5,000 distinct victims spread across 10 different campaigns, with a majority of the victims located in the U.S., the U.K., the Netherlands, Poland, France, Czechia, Japan, Australia, Germany, and Canada. Continuous Attack Surface Discovery & Penetration Testing Continuously discover, prioritize, & mitigate exposures with evidence-backed ASM, Pentesting, and Red Teaming.

Daily Brief Summary

MALWARE // New SquidLoader Malware Targets Chinese Organizations via Phishing

Cybersecurity experts identified a new malware loader, SquidLoader, primarily targeting Chinese entities through phishing emails disguised as legitimate Microsoft Word documents.

SquidLoader employs advanced evasion techniques including encrypted code segments and direct syscalls, complicating both static and dynamic malware analysis.

The malware facilitates the delivery of second-stage shellcode payloads, such as Cobalt Strike, directly within the loader process without writing payloads to disk, enhancing its ability to evade detection.

It features several defense evasion mechanisms such as Control Flow Graph obfuscation and debugger detection, which make it difficult for security programs to effectively identify and neutralize.

Loader malware is increasingly popular among cybercriminals, serving as a critical tool to bypass antivirus defenses and inject additional harmful payloads into compromised systems.

The discovery of SquidLoader follows similar findings of other loader malware like PikaBot and Taurus Loader, indicating a persistent and evolving threat landscape in malware development and deployment.

The recent operation "Endgame" led to the takedown of infrastructure supporting various loader malwares, signaling law enforcement's ongoing efforts to mitigate such cyber threats.