Cyber security news for all


    New, unusual Trojan horse promises tax benefits for COVID-19 victims

    A new Trojan horse appeared on cybersecurity researchers’ radar. Being aware that it could be bait in corona virus-related phishing schemes.

    MalwareHunterTeam first discovered it, the Trojan horse sample was attached to a file- “Company PLP_Tax relief due to Covid-19 outbreak CI+PL.jar.”

    Initially, only ESET antivirus engine recognized it.

    Trend Micro researchers said on Thursday that a Trojan called QNodeService lands on systems through a Java loader. The java loader built into the JAR file.

    Malicious programs are unusual because they are written in Node.js, a language primarily reserved for web server development.

    “However, using an unusual platform could help prevent detection by antivirus software,” experts say.

    The Java loader, hidden in the deceit document by Allatori, uses a malicious Node.js file. For example, either “qnodejs-win32-ia32.js” or “qnodejs-win32-x64.js”, and a file called “wizard.js.”

    The target computer loads with a 32-bit or 64-bit version of Node.js, depending on the Windows system’s architecture.

    Wizard.js’ job is to facilitate communication between the QNodeService and its command and control server. As well as maintain consistency by creating run registry keys.

    How it affects the system

    After starting on a vulnerable system, QNodeService can upload, download, and run files. Collect credentials from Google Chrome and Mozilla Firefox.

    In addition, the Trojan can steal system information, including its IP address and location. It can also download additional malware, and transfer stolen data to C2.

    These features are typical of many variants of Trojans. Still, there is an interesting feature, the “HTTP-forward” command, that allows attackers to upload files without connecting directly to the victim’s computer.

    “A valid request path and access token required to access files on the computer.” Trend Micro says, “The C2 server must first send a “file-manager/forward-access” to generate the URL and access token that will later be used for the “HTTP-forward” command.

    According to Trend Micro, the malware targets Windows computers, but the code says that “cross-platform compatibility may be a future goal.”

    Earlier this month, IBM security researchers saw significant changes to the Zeus Sphinx banking Trojan due to its integration into the new COVID-19 phishing campaigns.



    Recent Articles

    Related Stories