Cyber security news for all

More

    New, unusual Trojan horse promises tax benefits for COVID-19 victims

    A new Trojan horse appeared on cybersecurity researchers’ radar. Being aware that it could be bait in corona virus-related phishing schemes.

    MalwareHunterTeam first discovered it, the Trojan horse sample was attached to a file- “Company PLP_Tax relief due to Covid-19 outbreak CI+PL.jar.”

    Initially, only ESET antivirus engine recognized it.

    Trend Micro researchers said on Thursday that a Trojan called QNodeService lands on systems through a Java loader. The java loader built into the JAR file.

    Malicious programs are unusual because they are written in Node.js, a language primarily reserved for web server development.

    “However, using an unusual platform could help prevent detection by antivirus software,” experts say.

    The Java loader, hidden in the deceit document by Allatori, uses a malicious Node.js file. For example, either “qnodejs-win32-ia32.js” or “qnodejs-win32-x64.js”, and a file called “wizard.js.”

    The target computer loads with a 32-bit or 64-bit version of Node.js, depending on the Windows system’s architecture.

    Wizard.js’ job is to facilitate communication between the QNodeService and its command and control server. As well as maintain consistency by creating run registry keys.

    How it affects the system

    After starting on a vulnerable system, QNodeService can upload, download, and run files. Collect credentials from Google Chrome and Mozilla Firefox.

    In addition, the Trojan can steal system information, including its IP address and location. It can also download additional malware, and transfer stolen data to C2.

    These features are typical of many variants of Trojans. Still, there is an interesting feature, the “HTTP-forward” command, that allows attackers to upload files without connecting directly to the victim’s computer.

    “A valid request path and access token required to access files on the computer.” Trend Micro says, “The C2 server must first send a “file-manager/forward-access” to generate the URL and access token that will later be used for the “HTTP-forward” command.

    According to Trend Micro, the malware targets Windows computers, but the code says that “cross-platform compatibility may be a future goal.”

    Earlier this month, IBM security researchers saw significant changes to the Zeus Sphinx banking Trojan due to its integration into the new COVID-19 phishing campaigns.

     

     

    Recent Articles

    Millions of RDP attacks on home offices

    Since the corona related move to the home office, the number of daily hacker attacks on remote desktop connections has increased more than tenfold....

    KuCion crypto confirms 150 million dollar security breach

    Cyber criminals were able to steal from the KuCion crypto and stole coins worth millions. On the evening of last Friday, KuCion crypto noticed...

    Hungarian banks were the target of a massive DDoS attack

    Several banks and the Hungarian Telekom have been the target of a cyber attack. The attacks are said to have come in several waves...

    The source code of Windows XP is leaked

    The source code of Windows XP is currently freely accessible. The media says that data first appeared on 4chan and is currently being exchanged...

    Hackers send malicious Azure Cloud apps to Microsoft

    Microsoft has banned some Azure Cloud applications from its cloud that the company identified as part of an attack infrastructure. Microsoft describes the approach...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox