

Bandidos Malware Targeting Networks in South America
source link: https://news.softpedia.com/news/bandidos-malware-targeting-networks-in-south-america-533485.shtml
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

Cybersecurity researchers have discovered malware capable of gaining control of PC's in Latin America
ESET's Cybersecurity researchers disclosed yesterday a malware espionage campaign targeting South American commercial networks, with the majority of efforts focused on Venezuela, according to The Hacker News.
Bandidos is an improved version of the Bandook, a malware designed to target enterprises in industries such as healthcare, software services, retail, manufacturing, and construction. Developed by Dark Caracal, Bandook was used between 2015 and 2017 to gather intelligence. The group claims to be acting on behalf of Kazakh and Lebanese government interests.
According to the chain analysis of the latest attack, the PCs of potential victims can be infected by opening malicious emails that contain PDF attachments. The email provides the web address to download an archived package hosted on pCloud, Spideroak, or Google Cloud, as well as the password needed for unzipping it. Unpacking the download exposes a malware dropper that decrypts Bandook and injects it into the running Internet Explorer session.
In the latest form of Bandook examined by ESET, a total of 132 commands were detected, twelve more than Check Point could identify. This suggests that the cybercriminal organization behind the infection is constantly evolving its malicious tools to give them more capabilities and clout.
The malware employs Google Chrome extensions local storage to extract credentials
ESET's cybersecurity researcher Fernando Tavella explains that the ingenious implementation of the malware consists of the ChromeInject function. He adds "When the communication with the attacker's command and control server is established, the payload downloads a DLL file, which has an exported method that creates a malicious Chrome extension. The malicious extension tries to retrieve any credentials that the victim submits to a URL. These credentials are stored in Chrome's local storage."
The malware is extremely versatile, and its payload is capable of performing file modifications, capture screenshots, taking control of the cursor on the victim's PC, listing directory contents, terminating running processes, installing malicious DLL files, uninstalling itself from infected PCs, downloading malicious files from a specific web address, and even sending the information gathered to a remote server.
Photo Gallery (2 Images)
Recommend
-
12
'BotenaGo' malware found targeting millions of routers and IoT devices
-
6
Contributors: Giovanni Vigna, Oleg Boyarchuk, Stefano Ortolani Introduction The continued assault on Ukraine will go down in history as the first one that was truly carried out both kinetically on the battlefield and virtually...
-
5
SmartData Collective > IT > Security
-
3
First malware targeting AWS Lambda serverless platform disclosed Image Credit: AWS We are excited to bring Transform 2022 back in...
-
5
INDUSTRIAL CONTROL SYSTEMS — Hackers are targeting industrial systems with malware An entire ecosystem of sketchy software is targeting potentially critical infrastructure....
-
5
Intuitive Machines now targeting moon's south pole for delayed lunar landing mission By Elizabeth...
-
6
News China-based cyberespionage actor seen targeting South America Cyberthreat gr...
-
3
Hackers are targeting SonicWall devices with malware that can survive firmware updates The UNC4540 threat means to deploy persistent malware By
-
14
-
7
Reptile Rootkit: Advanced Linux Malware Targeting South Korean Systems Aug 05, 2023THN...
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK