Close Menu
  • Identity
  • Startups
  • Tech
  • Spanish
What's Hot

Suspension on state AI regulations clears Senate hurdles

LinkedIn CEO says AI writing assistants aren’t as popular as they’d expect

How a hardware wallet protects your private key: Security and safety instructions

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Identity
  • Startups
  • Tech
  • Spanish
Fyself News
Home » Leverage new Snake Keylogger Variant Leverage Auto Script to avoid detection
Identity

Leverage new Snake Keylogger Variant Leverage Auto Script to avoid detection

userBy userFebruary 19, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 19, 2025Hacker NewsMalware/Threat Intelligence

Snake Keylogger Variants

A new variant of the Snake KeyLogger malware is being used, and it actively targets Windows users in China, Turkey, Indonesia, Taiwan and Spain.

Fortinet Fortiguard Labs said the new version of the malware has lagged behind attempts to blocked infections of more than 280 million people worldwide since the beginning of the year.

“Snake KeyLogger, normally delivered via phishing emails containing malicious attachments and links, is popular in Chrome, Edge, Firefox and more by recording keystrokes, capturing qualifications and monitoring clipboards. It is designed to steal sensitive information from certain web browsers.

Cybersecurity

Other features allow threat actors to access stolen credentials and other sensitive data by using simple Mail Transfer Protocol (SMTP) and Telegram bots. I’ll do it. ”

What’s noteworthy about the latest attack set is the use of auto scripting language to deliver and execute the main payload. In other words, executables containing malware are car-compiled binary, allowing traditional detection mechanisms to be bypassed.

“Using a car not only complicates static analysis by embedding payloads in compiled scripts, but also allows for dynamic behavior that mimics benign automation tools,” Su added. .

Upon launching, Snake KeyLogger is designed to drop a copy of itself into “local_appdata%\supergroup” in a file named folder “Ageless.exe”. It also drops another file called “ageless.vbs” in the Windows Startup folder so Visual Basic Script (VBS) automatically launches the malware every time the system is restarted.

Through this persistence mechanism, Snake KeyLogger can maintain access to the compromised system and resume malicious activity even if the associated processes have ended.

Attack chains use a technique called process hollow to inject key payloads into legitimate .NET processes such as “Regsvcs.exe” to hide their presence within trusted processes and sidestep detection. I’ll allow it.

Snake KeyLogger has also been found to record and use keystrokes such as Checkip.dyndns.[.]An organization for obtaining victim IP addresses and geolocations.

Snake Keylogger Variants

“To capture keystrokes, we’re leveraging the setWindowshookex API. The first parameter is set to wh_keyboard_ll (flag 13), a low-level keyboard hook that monitors keystrokes,” Su says . “This technique allows malware to record sensitive inputs such as bank credentials.”

The development details a campaign in which CloudSek leverages the compromised infrastructure associated with educational institutions to ultimately deploy Lumma Stealer malware for malicious LNK files pose as PDF documents. Because I mentioned it.

The activities of target industries such as finance, healthcare, technology, and media are multi-stage attack sequences that result in the theft of passwords, browser data and cryptocurrency wallets.

“The campaign’s main infection vectors include the use of malicious LNK (shortcut) files created to display as legal PDF documents,” said security researcher Mayank Sahariya. Masu.

The LNK file runs a PowerShell command to connect to the remote server and retrieves the next stage of malware. This is obfuscated JavaScript code with another PowerShell that downloads and runs Lumma Stealer from the same server.

Cybersecurity

Over the past few weeks, steeler malware has been distributed via obfuscated JavaScript files, collecting a wide range of sensitive data from compromised Windows systems and extending it to telegraph bots running attackers.

“The attack starts with an obfuscated JavaScript file, which retrieves the encoded string from an open source service and runs the PowerShell script,” Cyfirma said.

“This script downloads JPG images and text files from IP addresses and URL shorteners. Both contain malicious MZ DOS executables embedded using steganography techniques.

Did you find this article interesting? This article is a donation from one of our precious partners. Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAPPG of events to host the first event in Congress
Next Article Murena is currently selling “deg” pixel tablets
user
  • Website

Related Posts

Spiders scattered behind M&S and cooperative cyberattacks, with up to $592 million in damages

June 21, 2025

Qilin ransomware adds “Cole Lawyer” feature that puts pressure on victims for larger ransoms

June 20, 2025

Television in Iranian states hijacked mid-distance broadcasts amid geopolitical tensions. $90 million stolen from Crypto Heist

June 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Suspension on state AI regulations clears Senate hurdles

LinkedIn CEO says AI writing assistants aren’t as popular as they’d expect

How a hardware wallet protects your private key: Security and safety instructions

Cartoonist Paul Pope is more worried about killer robots than AI plagiarism

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

How a hardware wallet protects your private key: Security and safety instructions

Top Startups and High-Tech Funding News for the Weekly Ends June 20, 2025

Apple is talking to you to win AI startup confusion

Mira Murati’s AI Startup Thinking Machine Lab emerges from stealth at $20 billion seed and $1 billion valuation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.