Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The Future of Process Automation is Here: Meet TwinH

Jack Dorsey says his “safe” new bitchat app hasn’t been tested for security

Hallucinations about soundslice on chatgpt music app frequently, founders have made to lie

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Cryptocurrency Miner and Clipper Malware spreads through SourceForge Cracked Software List
Identity

Cryptocurrency Miner and Clipper Malware spreads through SourceForge Cracked Software List

userBy userApril 8, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cryptocurrency miners and clipper malware

Threat actors have been observed that threaten malicious payloads such as Cryptocurrency Miner and Clipper Malware through the popular software hosting service SourceForge, pose as cracked versions of legal applications like Microsoft Office.

“One such project, OfficePackage, looks so harmless that its main website sourceforge.net includes a Microsoft Office add-in copied from a legitimate Github project,” Kaspersky said in a report published today. “The OfficePackage description and content listed below have also been obtained from Github.”

All projects created on sourceforge.net will be assigned the “.sourceforge.io” domain name, but the Russian cybersecurity company has discovered the domain “officepackage.sourceforge” for officepackage.[.]IO, “View a long list of Microsoft Office applications and corresponding links and download in Russian.

Plus, when you hover the download button, you’ll see a seemingly legal URL in the browser status bar: “Loading.SourceForge[.]IO/Download. Gives the impression that the download link is associated with SourceForge. However, when you click on the link, the user will be redirected to a completely different page hosted on “TapLink”[.]CC “This will show another download button prominently.

When the victim clicks on the download button, they will be provided with a 7 MB ZIP archive (“vinstaller.zip”). This includes a text file that contains a second password-protected archive (“installer.zip”) and a password when opened.

Cybersecurity

The MSI installers residing in the new ZIP file are multiple files, console archive utility called “Unrar.exe”, RAR archive, and console archive utility called Visual Basic (VB) scripts.

“The VB script runs the PowerShell interpreter to download and run the batch file confvk from GitHub,” says Kaspersky. “This file contains the password for the RAR archive. It also unpacks the malicious file and runs the next stage script.”

The batch file is designed to run two PowerShell scripts, one of which uses the Telegram API to send system metadata. The other file downloads another batch script that affects the contents of the RAR archive, and eventually launches the payloads of the miner and clipper malware (aka clip bunker).

It will also be deleted as well as the NetCat executable (“ShellexPerienceHost.exe”) which establishes an encrypted connection with the remote server. That’s not all. The confvk batch file is known to create another file named “errorhandler.cmd” containing a PowerShell script programmed to retrieve and execute text strings via the Telegram API.

The fact that the website has a Russian interface indicates that it focuses on Russian-speaking users. Telemetry data shows that 90% of potential casualties are in Russia, with 4,604 users encountering the scheme between early January and late March.

With SourceForge[.]The IO pages indexed by search engines and displayed in search results are considered to be targeted by Russian users searching for Microsoft Office in Yandex.

“When users ask for a way to download applications from official sources, attackers will provide their own,” says Kaspersky. “Attacks are primarily targeted at cryptocurrencies by deploying miners and clip bankers, but attackers can sell system access to more dangerous parties.”

This disclosure comes when it reveals details about a campaign that distributes malware downloaders called Tokps through rogue sites that impersonate DeepSeek Artificial Intelligence (AI) chatbots and impersonate remote desktop and 3D modeling software.

This includes websites such as deepseek-ai-soft[.]com, unsuspecting users will be redirected to each malware byte via sponsored Google search results.

Cybersecurity

TeakPS is designed to download and run PowerShell scripts that allow remote access to infected hosts via SSH, dropping a modified version of Trojan called Tevirat. This highlights the threat actor’s attempts to fully access the victim’s computer in a variety of ways.

“sample […] Kaspersky uses DLL sideloads to change and deploy TeamViewer remote access software to infected devices. “Simply put, attackers place malicious libraries in the same folder as TeamViewer.

The development follows the discovery of malicious Google Ads from popular VMware utility RVTools, and provides a tampered version of Thundershell (aka Smokedham), a PowerShell-based remote access tool (RAT).

“Thundershell, sometimes called Smokedham, is a publicly exposed post-exposure framework designed for red teams and penetration testing,” Field Effect said. “This provides a command-and-control (C2) environment, allowing operators to execute commands on compromised machines through PowerShell-based agents.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAmazon’s Zoox launches Robotaxi testing in Los Angeles
Next Article National Park Service restores original Harriet Tubman webpage
user
  • Website

Related Posts

The Future of Process Automation is Here: Meet TwinH

July 9, 2025

Gold Melody IAB exploits exposed ASP.NET machine keys to unauthorized access to targets

July 9, 2025

donot apt expands operations and targets the European Ministry of Foreign Affairs with lopticmod malware

July 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The Future of Process Automation is Here: Meet TwinH

Jack Dorsey says his “safe” new bitchat app hasn’t been tested for security

Hallucinations about soundslice on chatgpt music app frequently, founders have made to lie

Gold Melody IAB exploits exposed ASP.NET machine keys to unauthorized access to targets

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.