BTC $55865.7639
ETH $3222.4858
BNB $400.6682
SOL $110.6842
XRP $0.5548
ADA $0.6230
AVAX $39.2767
DOGE $0.0896
TRX $0.1404
wstETH $3751.1765
LINK $19.0474
DOT $8.0594
WETH $3236.9354
MATIC $1.0625
UNI $10.5983
WBTC $55965.3668
IMX $3.3901
ICP $13.0143
BCH $300.6764
LTC $74.8911
CAKE $3.2355
FIL $8.1517
ETC $28.1561
RNDR $7.4096
KAS $0.1718
DAI $0.9979
HBAR $0.1117
ATOM $11.3293
VET $0.0491
INJ $36.5642
TON $2.1072
OKB $51.3395
LDO $3.5443
FDUSD $1.0015
STX $3.0723
ARB $1.9162
NEAR $4.0168
XMR $131.7677
TIA $17.0755
XLM $0.1186
GRT $0.2823
ENS $22.2643
THETA $2.1117
MKR $2155.4331
WEMIX $2.1023
APEX $2.4575
BEAM $0.0357
BTC $55865.7639
ETH $3222.4858
BNB $400.6682
SOL $110.6842
XRP $0.5548
ADA $0.6230
AVAX $39.2767
DOGE $0.0896
TRX $0.1404
wstETH $3751.1765
LINK $19.0474
DOT $8.0594
WETH $3236.9354
MATIC $1.0625
UNI $10.5983
WBTC $55965.3668
IMX $3.3901
ICP $13.0143
BCH $300.6764
LTC $74.8911
CAKE $3.2355
FIL $8.1517
ETC $28.1561
RNDR $7.4096
KAS $0.1718
DAI $0.9979
HBAR $0.1117
ATOM $11.3293
VET $0.0491
INJ $36.5642
TON $2.1072
OKB $51.3395
LDO $3.5443
FDUSD $1.0015
STX $3.0723
ARB $1.9162
NEAR $4.0168
XMR $131.7677
TIA $17.0755
XLM $0.1186
GRT $0.2823
ENS $22.2643
THETA $2.1117
MKR $2155.4331
WEMIX $2.1023
APEX $2.4575
BEAM $0.0357
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Hackers use the Sign of the Internet to deliver malware


    The attackers bypass the Windows protection feature and download QBot and Cobalt Strike.

    Cybersecurity researcher ProxyLife has discovered that new phishing attacks exploit a Windows zero-day vulnerability that delivers Qbot malware bypassing Mark of the Web protections.

    When files are downloaded from an untrusted source, such as the Internet or an email attachment, Windows adds a special attribute to the file called Mark of the Web (MoTW). When a user tries to open a file with the MoTW attribute, Windows displays a security warning:

    In a new QBot phishing campaign, hackers exploit the Mark of the Web 0-day vulnerability by spreading JS files signed with garbled signatures. The campaign starts with an email containing a link to the document and a password to the file.

    Clicking the link downloads a password-protected ZIP archive containing another ZIP file containing an IMG file that Windows automatically mounts as a new drive. IMG file contains the following files:

    The JavaScript file contains a VBScript script that reads the "data.txt" file and adds some code to load the "port/resemblance.tmp" DLL file.

    Because the JS file is signed with the malformed key that was used in the Magniber campaigns to exploit the Windows 0-day vulnerability, the JS script loads QBot without displaying MoTW warnings. In addition, the QBot malware DLL is loaded into legitimate Windows processes to avoid detection, such as "wermgr.exe" or "AtBroker.exe".

    Microsoft has been aware of this vulnerability since October. Now that other malware campaigns are using it, the expert hopes the bug will be fixed as part of security updates in December 2022.

    Once downloaded, QBot (Qakbot) steals emails in the background to be used in other phishing attacks or to install additional payloads such as Brute Ratel, Cobalt Strike and other malware.

    Author DeepWeb
    Lazarus hackers update their ATM hacking tool
    Typhon revived and became more powerful

    Comments 0

    Add comment