News

Discord is used as a base for trojans and LockBit ransomware

If you’re into crypto then the following information is definitely for you. Cyber security researchers warn of new strains of cryptor which specifically targets cryptocurrency communities at Discord. They say under the radar of this malware such communities as DeFi, NFT and the Crypto were recently seen to be targets. For those who are little far from all this cryptocurrency thing NFTs mean non-fungible tokens. This term stands for unique tokens that give the ownership right for data stored on the blockchain technology. Few years ago the whole industry rose significantly with an estimated worth of more than $2.5 trillion.

People on Discord started to receive fake messages

Inside the industry people use Discord, a group`s chatting platform, where you can join any chat and send privately one another messages. Crypto that this campaign deploys specialists named Babadeda (a Russian language placeholder used by the crypter). It can easily bypass signature-based antivirus solutions. In recent campaigns attackers used Babadeda to deliver RATs, information stealers and even LockBit ransomware.

In the campaign threat actor created a Discord bot account on the official company discord channel. They sent unsuspicious users a private message inviting them to download a related application that would give the user access to new features and/or additional benefits. Many people believed such messages to be legitimate because it looked like they were sent by the company. That message contained a URL which would direct the user to a fake site. Everything was so orchestrated that a user would download a malicious installer. What will you see inside of it – spyware, ransomware or a backdoor – only crooks know.

Fake message that users on Discord were receiving

Threat actor took extra measures to make everything look legit

The actor took extra measures to make everything look legitimate. And among those are :

  • The fake page had very similar UI to the the original page;
  • Actors signed the domains with a certificate (via LetsEncrypt) which enabled an HTTPS connection;
  • They also used a technique called cybersquatting. That is when threat actors change by adding or removing a letter from the original domain or top-level domain;
  • If a user clicks on “Download APP” the site would redirect the download request to a different domain via /downland.php,. This makes it possible that someone will not detect a fake site. Cyber security specialists identified 82 domains made between July 24, 2021, and November 17, 2021. They found different variants of the same Crypter. All of them had the same main execution flow. Threat actors hide the Cryptor inside legitimate applications that makes it hard for intended software to detect it.
  • Once the user downloaded the malicious installer it begins execution and copies compressed files into a newly done folder named quite legitimate IIS Application Health Monitor in one of the following directory paths:
    C:\Users\\AppData\Local\
    C:\Users\\AppData\Roaming\

    A little technical details of the cryptor

    The installer copies malicious files along with other free or open-source application-related files. After the cryptor did dropping of the files execution starts via the main executable. At this stage the fake Application Error message will pop up to make a user think that the program failed while it is still secretly running in the background. Upon the close inspections of the function`s code cyber security specialists discovered that it is much longer than the actual DLL loading code. This was specifically done to obfuscate its real intentions and make it harder for detection. In the next stage execution takes place inside an additional file, usually it is a PDF or an XML file. But cybersecurity specialists note that they also saw usage of such files as PNG, Text or JavaScript. Then follows a complex set of actions that is too long to put in one post.

    The process of fixing tables and removing altering evidence

    In conclusion we will be short. The final stage finds itself in the fixing of the import address table and relocation table of the newly injected PE. And the malware jumps to the entry point of the newly injected PE with the original command-line arguments.

    Andrew Nail

    Cybersecurity journalist from Montreal, Canada. Studied communication sciences at Universite de Montreal. I was not sure if a journalist job is what I want to do in my life, but in conjunction with technical sciences, it is exactly what I like to do. My job is to catch the most current trends in the cybersecurity world and help people to deal with malware they have on their PCs.

    Recent Posts

    Remove Streamingsafevpn.com Pop-up Ads

    About Streamingsafevpn.com Streamingsafevpn.com pop-ups can not expose out of nowhere. If you have actually clicked…

    1 day ago

    Remove Psegeevalrat.net Pop-up Ads

    About Psegeevalrat.net Psegeevalrat.net pop-ups can not launch out of the blue. If you have clicked…

    1 day ago

    Remove Thi-tl-310-a.buzz Pop-up Ads

    About Thi-tl-310-a.buzz Thi-tl-310-a.buzz pop-ups can not expose out of the blue. If you have clicked…

    2 days ago

    Remove Toreffirmading.com Pop-up Ads

    About Toreffirmading.com Toreffirmading.com pop-ups can not open out of the blue. If you have clicked…

    2 days ago

    Remove News-xboveho.site Pop-up Ads

    About News-xboveho.site News-xboveho.site pop-ups can not introduce out of the blue. If you have actually…

    2 days ago

    Remove Glayingly.com Pop-up Ads

    About Glayingly.com Glayingly.com pop-ups can not open out of the blue. If you have clicked…

    2 days ago