Lucene search

K
thnThe Hacker NewsTHN:4D29B0553CB2DA2F5116FB532CD3CF3A
HistoryFeb 11, 2023 - 11:11 a.m.

Enigma, Vector, and TgToxic: The New Threats to Cryptocurrency Users

2023-02-1111:11:00
The Hacker News
thehackernews.com
44

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

Cryptocurrency Users

Suspected Russian threat actors have been targeting Eastern European users in the crypto industry with fake job opportunities as bait to install information-stealing malware on compromised hosts.

The attackers โ€œuse several highly obfuscated and under-development custom loaders in order to infect those involved in the cryptocurrency industry with Enigma stealer,โ€ Trend Micro researchers Aliakbar Zahravi and Peter Girnus said in a report this week.

Enigma is said to be an altered version of Stealerium, an open source C#-based malware that acts as a stealer, clipper, and keylogger.

The intricate infection journey starts with a rogue RAR archive file thatโ€™s distributed via phishing or social media platforms. It contains two documents, one of which is a .TXT file that includes a set of sample interview questions related to cryptocurrency.

The second file is a Microsoft Word document that, while serving as a decoy, is tasked with launching the first-stage Enigma loader, which, in turn, downloads and executes an obfuscated secondary-stage payload through Telegram.

โ€œTo download the next stage payload, the malware first sends a request to the attacker-controlled Telegram channel [โ€ฆ] to obtain the file path,โ€ the researchers said. โ€œThis approach allows the attacker to continuously update and eliminates reliance on fixed file names.โ€

The second-stage downloader, which is executed with elevated privileges, is designed to disable Microsoft Defender and install a third-stage by deploying a legitimately signed kernel mode Intel driver thatโ€™s vulnerable to CVE-2015-2291 in a technique called Bring Your Own Vulnerable Driver (BYOVD).

Itโ€™s worth noting that the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.

The third-stage payload ultimately paves the way for downloading Enigma Stealer from an actor-controlled Telegram channel. The malware, like other stealers, comes with features to harvest sensitive information, record keystrokes, and capture screenshots, all of which is exfiltrated back by means of Telegram.

Cryptocurrency Users

Bogus job offers are a tried-and-tested tactic employed by North Korea-backed Lazarus Group in its attacks targeting the crypto sector. The adoption of this modus operandi by Russian threat actors โ€œdemonstrates a persistent and lucrative attack vector.โ€

The findings come as Uptycs released details of an attack campaign that leverages the Stealerium malware to siphon personal data, including credentials for cryptocurrency wallets such as Armory, Atomic Wallet, Coinomi, Electrum, Exodus, Guarda, Jaxx Liberty, and Zcash, among others.

Uptycs

Joining Enigma Stealer and Stealerium in targeting cryptocurrency wallets is yet another malware dubbed Vector Stealer that also comes with capabilities to steal .RDP files, enabling the threat actors to carry out RDP hijacking for remote access, Cyble said in a technical write-up.

Attack chains documented by the cybersecurity firms show that the malware families are delivered through Microsoft Office attachments containing malicious macros, suggesting that miscreants are still relying on the method despite Microsoftโ€™s attempts to close the loophole.

A similar method has also been put to use to deploy a Monero crypto miner against the backdrop of a cryptojacking and phishing campaign aimed at Spanish users, according to Fortinet FortiGuard Labs.

Monero crypto miner

The development is also the latest in a long list of attacks that are aimed at stealing victimsโ€™ cryptocurrency assets across platforms.

This comprises a โ€œrapidly evolvingโ€ Android banking trojan referred to as TgToxic, which plunders credentials and funds from crypto wallets as well as bank and finance apps. The ongoing malware campaign, active since July 2022, is directed against mobile users in Taiwan, Thailand, and Indonesia.

โ€œWhen the victim downloads the fake app from the website given by the threat actor, or if victim tries to send a direct message to the threat actor through messaging apps such as WhatsApp or Viber, the cybercriminal deceives the user into registering, installing the malware, and enabling the permissions it needs,โ€ Trend Micro said.

The rogue apps, besides abusing Androidโ€™s accessibility services to carry out the unauthorized fund transfers, is also notable for taking advantage of legitimate automation frameworks like Easyclick and Auto.js to perform clicks and gestures, making it the second Android malware after PixPirate to incorporate such workflow IDEs.

But social engineering campaigns have also gone beyond social media phishing and smishing by setting up convincing landing pages that imitate popular crypto services with the goal of transferring Ethereum and NFTs from the hacked wallets.

This, according to Recorded Future, is achieved by injecting a crypto drainer script into the phishing page which lures victims into connecting their wallets with lucrative offers to mint non-fungible tokens (NFTs).

Such ready-made phishing pages are being sold on darknet forums as part of whatโ€™s called a phishing-as-a-service (PhaaS) scheme, permitting other actors to rent out these packages and swiftly enact malicious operations at scale.

โ€œโ€˜Crypto drainersโ€™ are malicious scripts that function like e-skimmers and are deployed with phishing techniques to steal victimsโ€™ crypto assets,โ€ the company said in a report published last week, describing the scams as effective and growing in popularity.

โ€œThe use of legitimate services on crypto drainer phishing pages may increase the likelihood that the phishing page will pass an otherwise savvy userโ€™s โ€˜scam litmus test.โ€™ Once crypto wallets have been compromised, no safeguards exist to prevent the illicit transfer of assets to attackersโ€™ wallets.โ€

The assaults come at a time when criminal groups have stolen a record-breaking $3.8 billion from crypto businesses in 2022, with much of the spike attributed to North Korean state-sponsored hacking crews.

Found this article interesting? Follow us on Twitter ๏‚™ and LinkedIn to read more exclusive content we post.

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C