Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks

The Hacker News by The Hacker News
January 27, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Jan 27, 2025Ravie LakshmananMalware / SEO Poisoning

Threat hunters have detailed an ongoing campaign that leverages a malware loader called MintsLoader to distribute secondary payloads such as the StealC information stealer and a legitimate open-source network computing platform called BOINC.

“MintsLoader is a PowerShell based malware loader that has been seen delivered via spam emails with a link to Kongtuke/ClickFix pages or a JScript file,” cybersecurity firm eSentire said in an analysis.

The campaign has targeted electricity, oil and gas, and the legal services sectors in the United States and Europe, per the company, which detected the activity in early January 2025.

The development comes amid a spike in malicious campaigns that are abusing fake CAPTCHA verification prompts to trick users into copying and executing PowerShell scripts to get around the checks, a technique that has come to be known ClickFix and KongTuke.

Cybersecurity

“KongTuke involves an injected script that currently causes associated websites to display fake ‘verify you are human’ pages,” Palo Alto Networks Unit 42 said in a report detailing a similar campaign distributing BOINC.

“These fake verification pages load a potential victim’s Windows copy/paste buffer with malicious PowerShell script. The page also gives detailed instructions asking potential victims to paste and execute the script in a Run window.”

The attack chain documented by eSentire starts when users click on a link in a spam email, leading to the download of an obfuscated JavaScript file. The script is responsible for running a PowerShell command to download MintsLoader via curl and execute it, after which it deletes itself from the host to avoid leaving traces.

Alternate sequences redirect the message recipients to ClickFix-style pages that lead to the delivery of MintsLoader by means of the Windows Run prompt.

The loader malware, in turn, contacts a command-and-control (C2) server to fetch interim PowerShell payloads that performs various checks to evade sandboxes and resist analysis efforts. It also features a Domain Generation Algorithm (DGA) with a seed value based on the addition of the current day of the month to create the C2 domain name.

The attack culminates with the deployment of StealC, an information stealer sold under the malware-as-a-service (MaaS) model since early 2023. It’s assessed to be re-engineered from another stealer malware known as Arkei. One of the notable features of the malware is its ability to avoid infecting machines located in Russia, Ukraine, Belarus, Kazakhstan, or Uzbekistan.

News of the MintsLoader campaign also follows the emergence of an updated version of the JinxLoader dubbed Astolfo Loader (aka Jinx V3) that has been rewritten in C++ likely for performance reasons after its source code was sold off by the malware author Rendnza to two separate buyers Delfin and AstolfoLoader.

“While @Delfin claims to be selling JinxLoaderV2 unchanged, @AstolfoLoader opted to rebrand the malware and modify the stub to C++ (Jinx V3), instead of using the original Go-compiled binary,” BlackBerry noted late last year.

“Services like JinxLoader and its successor, Astolfo Loader (Jinx V3), exemplify how such tools can proliferate quickly and affordably and can be purchased via popular public hacking forums that are accessible to virtually anyone with an Internet connection.”

Cybersecurity

Cybersecurity researchers have also shed light on the inner workings of the GootLoader malware campaigns, which are known to weaponize search engine optimization (SEO) poisoning to redirect victims searching for agreements and contracts to compromised WordPress sites that host a realistic-looking message board to download a file that contains what they are purportedly looking for.

The malware operators have been found to make changes to the WordPress sites that cause those sites to dynamically load the fake forum page content from another server, referred to as the “mothership” by Sophos.

GootLoader campaigns, besides geofencing IP address ranges and allowing requests to originate from specific countries of interest, go further by permitting the potential victim to visit the infected site only once in 24 hours by adding the IP to a block list.

“Every aspect of this process is obfuscated to such a degree that even the owners of the compromised WordPress pages often cannot identify the modifications in their own site or trigger the GootLoader code to run when they visit their own pages,” security researcher Gabor Szappanos said.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
The Hacker News

The Hacker News

Next Post
GamaCopy Mimics Gamaredon Tactics in Cyber Espionage Targeting Russian Entities

GamaCopy Mimics Gamaredon Tactics in Cyber Espionage Targeting Russian Entities

Recommended.

If this alarm clock can’t get you out of bed in the morning, nothing will

If this alarm clock can’t get you out of bed in the morning, nothing will

February 22, 2025
TDS and UScellular to release fourth quarter operating results and host conference call on February 21, 2025

TDS and UScellular to release fourth quarter operating results and host conference call on February 21, 2025

February 7, 2025

Trending.

VIDIZMO Earns Microsoft Solutions Partner Designations for All Three Areas of Azure, Solidifying its Expertise in Delivering AI Solutions

VIDIZMO Earns Microsoft Solutions Partner Designations for All Three Areas of Azure, Solidifying its Expertise in Delivering AI Solutions

June 28, 2025
Tilson Continues to Perform for Clients; Shares Substantial Progress in Chapter 11 Process

Tilson Continues to Perform for Clients; Shares Substantial Progress in Chapter 11 Process

June 27, 2025
OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors

OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors

June 27, 2025
DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes

DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes

June 23, 2025
Le nombre d’utilisateurs de la 5G-A atteint les dix millions en Chine : Huawei présente le développement de la 5G-A et la valeur de l’IA basée sur des scénarios

Le nombre d’utilisateurs de la 5G-A atteint les dix millions en Chine : Huawei présente le développement de la 5G-A et la valeur de l’IA basée sur des scénarios

June 27, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio