BTC $63106.6694
ETH $3487.9438
BNB $414.1963
SOL $130.3204
XRP $0.6266
ADA $0.7278
DOGE $0.1539
AVAX $42.5755
DOT $9.7892
wstETH $4037.4917
TRX $0.1406
LINK $20.4990
WETH $3499.8168
UNI $12.6173
MATIC $1.0884
WBTC $63001.9284
BCH $469.6209
LTC $90.6161
IMX $3.3186
ICP $13.1704
FIL $10.4844
CAKE $3.3134
ETC $33.5274
LEO $4.7930
RNDR $7.5543
ATOM $12.1588
TON $2.6746
KAS $0.1670
HBAR $0.1129
INJ $40.6985
DAI $0.9987
OKB $58.1613
VET $0.0490
FDUSD $0.9985
WEMIX $2.8142
STX $3.0406
XMR $150.5516
XLM $0.1355
GRT $0.3198
NEAR $4.4292
LDO $3.3186
ARB $2.0442
PEPE $0.0000
THETA $2.3783
TIA $16.3918
ENS $22.1565
CRO $0.1418
BTC $63106.6694
ETH $3487.9438
BNB $414.1963
SOL $130.3204
XRP $0.6266
ADA $0.7278
DOGE $0.1539
AVAX $42.5755
DOT $9.7892
wstETH $4037.4917
TRX $0.1406
LINK $20.4990
WETH $3499.8168
UNI $12.6173
MATIC $1.0884
WBTC $63001.9284
BCH $469.6209
LTC $90.6161
IMX $3.3186
ICP $13.1704
FIL $10.4844
CAKE $3.3134
ETC $33.5274
LEO $4.7930
RNDR $7.5543
ATOM $12.1588
TON $2.6746
KAS $0.1670
HBAR $0.1129
INJ $40.6985
DAI $0.9987
OKB $58.1613
VET $0.0490
FDUSD $0.9985
WEMIX $2.8142
STX $3.0406
XMR $150.5516
XLM $0.1355
GRT $0.3198
NEAR $4.4292
LDO $3.3186
ARB $2.0442
PEPE $0.0000
THETA $2.3783
TIA $16.3918
ENS $22.1565
CRO $0.1418
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • SYS01stealer is a new threat that uses fake Facebook ads

    Cybersecurity researchers have discovered a new data thief called SYS01stealer. The malware targets employees of critical government infrastructure, manufacturing companies and other sectors.

    “The threats behind this campaign target Facebook business accounts. They use Google Ads and fake Facebook profiles that advertise games, adult content, hacked software, etc. to lure victims into downloading a malicious file. The attacks aim to steal sensitive information, including login information, cookies, and business account information,” Morphisec said in a report.

    Morphisec officials said the malware campaign was originally linked to a financially motivated cybercrime operation that Zscaler researchers dubbed "Ducktail." However, WithSecure, which first documented the cluster of Ducktail activity in July 2022, said the malware campaigns are different. This confusion points to how the attackers managed to confuse cybersecurity experts and evade detection.

    The attack chain, according to Morphisec, begins when a victim clicks on a link from a fake Facebook profile or Google Ads ad to download a ZIP archive disguised as hacked software or adult content.

    Opening a ZIP file launches a loader based on a legitimate C# application that is vulnerable to DLL Sideloading, allowing a malicious DLL to be loaded along with the application.

    Some of the applications used to download the rogue DLL are Western Digital's WDSyncService.exe and Garmin's ElevatedInstaller.exe. In some cases, the downloaded unpublished DLL acts as a means to deploy Python and Rust-based intermediate executables. Regardless of the approach used, all paths lead to the delivery of an installer that delivers and runs the PHP-based SYS01stealer malware.

    Infostealer is designed to collect Facebook cookies from Chromium-based web browsers, exfiltrate victim's Facebook information to a remote server, and download and run arbitrary files. The malware can also download files from an infected host to a C2 server, execute its commands, and update itself if a fresh version is available.

    “DLL Sideloading is a very effective way to force Windows systems to load malicious code. When an application is loaded into memory, it downloads a malicious file instead of a legitimate one, allowing hackers to capture legitimate, trusted, and even signed applications for their malicious purposes,” Morphisec said.
    Author DeepWeb
    Chinese UNC4540 hackers spy using unpatched SonicWall devices
    Allegedly, the Russian group Winter Vivern attacks government organizations in different countries

    Comments 0

    Add comment