Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

131 Chrome extensions found to be hijacking WhatsApp Web in massive spam campaign

£20m science and technology boost supports regional innovation

UK to create 860,000 clean energy jobs by 2030

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers spreading Agent Tesla, Asyncrat and Snake KeyLogger using the new QuirkyLoader malware
Identity

Hackers spreading Agent Tesla, Asyncrat and Snake KeyLogger using the new QuirkyLoader malware

userBy userAugust 21, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 21, 2025Ravi LakshmananMalware/Email Security

Cybersecurity researchers have revealed details of a new malware loader called QuirkyLoader, which has been used via email spam campaigns since November 2024, from information steelers to remote access trojans.

Notable malware families distributed using QuirkyLoader include agents Tesla, Asyncrat, Formbook, MassLogger, Remcos Rat, Rhadamanthys Stealer, and Snake Keylogger.

IBM X-Force, detailing the malware, said the attack involves sending spam emails from both legitimate email service providers and self-hosted email servers. These emails feature malicious archives containing DLLs, encrypted payloads, and actual executables.

“The actors use DLL sideloading, a technology that also loads malicious DLLs by launching legal executables,” said security researcher Raymond Joseph Alfonso. “This DLL in turn injects, decodes, and injects the final payload into the target process.”

Cybersecurity

This is achieved by injecting malware into one of three processes using process hollow: addinProcess32.exe, installutil.exe, or aspnet_wp.exe.

DLL loaders per IBM have been used in limited campaigns for the past few months, with two campaigns observed in July 2025 targeting Taiwan and Mexico.

The Taiwan-targeted campaign is said to have specifically selected employees of Nusoft Taiwan, a network and internet security research company based in New Taipei, with the aim of infecting Snake Keylogger, which can steal sensitive information from popular web browsers, keystrokes and clipboard content.

Meanwhile, Mexico-related campaigns are rated random, with infection chains offering Remcos Rat and Asyncrat.

“Threat Actor writes DLL loader modules consistently in the .NET language and uses predecessor (AOT) compilation,” Alfonso said. “This process will display as if you had compiled your code into native machine code before running and the resulting binary was written in C or C++.”

New Fishing Trends

The development uses new QR code phishing (aka Quishing) tactics by threat subjects, which splits malicious QR codes into two parts, or embeds them in legitimate QR codes in email messages that are detected via propaggets via phishing kits such as Gabagool or Tycoon, demonstrating ongoing evolution.

“Malicious QR codes are popular with attackers for several reasons,” said Rohit Suresh Kanase, a researcher at Barracuda. “They should not raise the red flag because they cannot be read by humans. They can often bypass traditional security measures such as email filters and link scanners.”

“In addition, recipients often need to switch to mobile devices to scan the code, allowing users to move away from the company’s security perimeter and from protection.”

Identity Security Risk Assessment

The findings also follow the emergence of phishing kits that venom threat actors use to obtain qualifications and two-factor authentication (2FA) codes from individuals and organizations, access victims’ accounts, and send emails to carry out cryptocurrency fraud.

“The domains that host this phishing kit are targeting individual qualifications, impersonating login services from prominent CRMs and bulk mail companies such as Google, SendGrid, and MailChimp,” NVISO Labs said. “Poisonseed employs spear phishing emails that embed malicious links, redirecting victims to a phishing kit.”

A notable aspect of the kit is the use of a technique known as precision verification phishing, in which attackers validate email addresses in real time in the background. Once the check is passed, you will be presented with a login form impersonating a legitimate online platform, allowing the threat actor to capture the submitted credentials before relaying them to the service.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleImportant findings from Blue Report 2025
Next Article UK Industrial Strategy Boosts Science and Technology in Northern Ireland
user
  • Website

Related Posts

131 Chrome extensions found to be hijacking WhatsApp Web in massive spam campaign

October 20, 2025

MSS claims NSA used 42 cyber tools in multi-stage attack on Beijing Time System

October 20, 2025

Europol dismantles SIM farm network running 49 million fake accounts worldwide

October 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

131 Chrome extensions found to be hijacking WhatsApp Web in massive spam campaign

£20m science and technology boost supports regional innovation

UK to create 860,000 clean energy jobs by 2030

The man who bet everything on AI and Bill Belichick

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.