Article Details
Scrape Timestamp (UTC): 2023-09-27 08:56:34.967
Source: https://thehackernews.com/2023/09/new-zenrat-malware-targeting-windows.html
Original Article Text
Click to Toggle View
New ZenRAT Malware Targeting Windows Users via Fake Password Manager Software. A new malware strain called ZenRAT has emerged in the wild that's distributed via bogus installation packages of the Bitwarden password manager. "The malware is specifically targeting Windows users and will redirect people using other hosts to a benign web page," enterprise security firm Proofpoint said in a technical report. "The malware is a modular remote access trojan (RAT) with information stealing capabilities." ZenRAT is hosted on fake websites pretending to be associated with Bitwarden, although it's uncertain as to how traffic is being directed to the domains. Such malware has been propagated via phishing, malvertising, or SEO poisoning attacks in the past. The payload (Bitwarden-Installer-version-2023-7-1.exe), downloaded from crazygameis[.]com, is a trojanized version of the standard Bitwarden installation package that contains a malicious .NET executable (ApplicationRuntimeMonitor.exe). A noteworthy aspect of the campaign is that users who end up visiting the deceptive website from non-Windows systems are redirected to a cloned opensource.com article published in March 2018 about "How to manage your passwords with Bitwarden, a LastPass alternative." Further, Windows users clicking on downloading links marked for Linux or macOS on the Downloads page are redirected to the legitimate Bitwarden site, vault.bitwarden.com. An analysis of the installer's metadata reveals attempts on the part of the threat actor to masquerade the malware as Piriform's Speccy, a freeware Windows utility to show hardware and software information. The digital signature used to sign the executable is not only invalid, but also claims to be signed by Tim Kosse, a well-known German computer scientist known for developing the free cross-platform FTP software FileZilla. ZenRAT, once launched, gathers details about the host, including CPU name, GPU name, operating system version, browser credentials, and installed applications and security software, to a command-and-control (C2) server (185.186.72[.]14) operated by the threat actors. "The client initiates communication to the C2," Proofpoint said. "Regardless of the command, and extra data transmitted, the first packet is always 73 bytes." ZenRAT is also configured to transmit its logs to the server in plaintext, which captures a series of system checks carried out by the malware and the status of the execution of each module, indicating its use as a "modular, extendable implant." To mitigate such threats, it's recommended that users download software only from trusted sources and ensure the authenticity of the websites. The disclosure comes as the information stealer known as Lumma Stealer has been observed compromising manufacturing, retail, and business industries since the beginning of August 2023. "The infostealer was delivered via drive-by downloads disguised as fake installers such as Chrome and Edge browser installers, and some of them were distributed via PrivateLoader," eSentire said earlier this month. In a related campaign, rogue websites impersonating Google Business Profile and Google Sheets were found to trick users into installing a stealer malware dubbed Stealc under the pretext of a security update. "Drive-by downloads continue to be a prevalent method to spread malware, such as information stealers and loaders," the Canadian cybersecurity company noted.
Daily Brief Summary
A new modular remote access trojan (RAT) called ZenRAT is being distributed through false installation packages of Bitwarden password manager, deliberately targeting Windows users.
The malware, hosted on fake websites, redirects visitors on non-Windows systems to harmless web pages, while Windows users downloading Linux or macOS links are led to the legitimate Bitwarden website.
The payload containing the malware, named 'Bitwarden-Installer-version-2023-7-1.exe', is a trojan version of the typical Bitwarden installation package containing a malicious .NET executable known as ApplicationRuntimeMonitor.exe.
The malware gathers extensive data about the host, such as CPU and GPU names, browser credentials, installed applications and security software, and sends it to a command-and-control (C2) server operated by the threat actors.
ZenRAT communicates logs, in plaintext, of system checks and module execution statuses to its C2 server, indicating that the malware can be extended with additional modules.
Users are advised to mitigate such threats by downloading software only from trusted sources and verifying website authenticity.
The revelation of ZenRAT coincides with ongoing campaigns by other malware such as Lumma Stealer and Stealc.