Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer

The Hacker News by The Hacker News
January 17, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Jan 16, 2025Ravie LakshmananMalware / Ransomware

Threat actors have been observed concealing malicious code in images to deliver malware such as VIP Keylogger and 0bj3ctivity Stealer as part of separate campaigns.

“In both campaigns, attackers hid malicious code in images they uploaded to archive[.]org, a file-hosting website, and used the same .NET loader to install their final payloads,” HP Wolf Security said in its Threat Insights Report for Q3 2024 shared with The Hacker News.

The starting point is a phishing email that masquerades as invoices and purchase orders to trick recipients into opening malicious attachments, such as Microsoft Excel documents, that, when opened, exploits a known security flaw in Equation Editor (CVE-2017-11882) to download a VBScript file.

Cybersecurity

The script, for its part, is designed to decode and run a PowerShell script that retrieves an image hosted on archive[.]org and extracts a Base64-encoded code, which is subsequently decoded into a .NET executable and executed.

The .NET executable serves as a loader to download VIP Keylogger from a given URL and runs it, allowing the threat actors to steal a wide range of data from the infected systems, including keystrokes, clipboard content, screenshots, and credentials. VIP Keylogger shares functional overlaps with Snake Keylogger and 404 Keylogger.

A similar campaign has been found to send malicious archive files to targets by email. These messages, which pose as requests for quotations, aim to lure visitors into opening a JavaScript file within the archive that then launches a PowerShell script.

Like in the previous case, the PowerShell script downloads an image from a remote server, parses the Base64-encoded code within it, and runs the same .NET-based loader. What’s different is that the attack chain culminates with the deployment of an information stealer named 0bj3ctivity.

The parallels between the two campaigns suggest that threat actors are leveraging malware kits to improve the overall efficiency, while also lowering the time and technical expertise needed to craft the attacks.

HP Wolf Security also said it observed bad actors resorting to HTML smuggling techniques to drop the XWorm remote access trojan (RAT) by means of an AutoIt dropper, echoing prior campaigns that distributed AsyncRAT in a similar fashion.

“Notably, the HTML files bore hallmarks suggesting that they had been written with the help of GenAI,” HP said. “The activity points to the growing use of GenAI in the initial access and malware delivery stages of the attack chain.”

Cybersecurity

“Indeed, threat actors stand to gain numerous benefits from GenAI, from scaling attacks and creating variations that could increase their infection rates, to making attribution by network defenders more difficult.”

That’s not all. Threat actors have been spotted creating GitHub repositories advertising video game cheat and modification tools in order to deploy the Lumma Stealer malware using a .NET dropper.

“The campaigns analyzed provide further evidence of the commodification of cybercrime,” Alex Holland, principal threat researcher in the HP Security Lab, said. “As malware-by-numbers kits are more freely available, affordable, and easy to use, even novices with limited skills and knowledge can put together an effective infection chain.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
The Hacker News

The Hacker News

Next Post
Researchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictions

Researchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictions

Recommended.

Ericsson and Telstra pioneer the first programmable network in Asia-Pacific

Ericsson and Telstra pioneer the first programmable network in Asia-Pacific

February 20, 2025
OpenAI Backs Down on Restructuring Amid Pushback

OpenAI Backs Down on Restructuring Amid Pushback

May 5, 2025

Trending.

VIDIZMO Earns Microsoft Solutions Partner Designations for All Three Areas of Azure, Solidifying its Expertise in Delivering AI Solutions

VIDIZMO Earns Microsoft Solutions Partner Designations for All Three Areas of Azure, Solidifying its Expertise in Delivering AI Solutions

June 28, 2025
Tilson Continues to Perform for Clients; Shares Substantial Progress in Chapter 11 Process

Tilson Continues to Perform for Clients; Shares Substantial Progress in Chapter 11 Process

June 27, 2025
OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors

OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors

June 27, 2025
DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes

DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes

June 23, 2025
Le nombre d’utilisateurs de la 5G-A atteint les dix millions en Chine : Huawei présente le développement de la 5G-A et la valeur de l’IA basée sur des scénarios

Le nombre d’utilisateurs de la 5G-A atteint les dix millions en Chine : Huawei présente le développement de la 5G-A et la valeur de l’IA basée sur des scénarios

June 27, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio