News

Password-stealing malware LokiBot started hiding its code in pictures

The famous LokiBot malware now uses steganography as an extra layer of obfuscation.

Researchers at Trend Micro have recorded a new variant of the malware and conducted its analysis. Apparently, the authors are now actively finalizing and improving LokiBot.

“Our analysis of a new LokiBot variant shows that it has improved its capabilities for staying undetected within a system via an updated persistence mechanism and the use of steganography to hide its code”, — reported Trend Micro researchers.

A malicious program has been adopted by some cybercriminal groups, including Nigerian attackers SilverTerrier.

Read also: The new version of the banking Trojan TrickBot “kicks off” Windows Defender

LokiBot can steal information from 25 different browsers, check the availability of tools for remote administration (SSH, VNC, RDP), and retrieve credentials from email clients.

In the latest versions of malware, the authors taught him to hide code in images.

“One characteristic of the image file that we found interesting is that it can actually be opened as an image. However, it also contains data that LokiBot references in its unpacking routine”, — explained Trend Micro specialists.

Lokibot steganography

This code is used at one stage of the attack to unpack. An analysis of experts showed that the image contains an encrypted binary, which the malware uses to decrypt LokiBot in the RAM of the infected device.

“One likely reason for this particular variant’s reliance on steganography is that it adds another layer of obfuscation — wscript (the VBS file interpreter) is used to execute the malware instead of the actual malware executing itself. Since the autostart mechanism uses a script, future variants can choose to”, — Trend Micro specialists write.

Researchers note that this approach, that LokiBot malware uses steganography, not only allows the malware to bypass detection, but also to become stronger in the attacked system.

Polina Lisovskaya

I works as a marketing manager for years now and loves searching for interesting topics for you

Recent Posts

Remove Oxylersess.co.in Pop-up Ads

About Oxylersess.co.in Oxylersess.co.in pop-ups can not launch out of the blue. If you have clicked…

36 minutes ago

Remove Rewardznga.com Pop-up Ads

About Rewardznga.com Rewardznga.com pop-ups can not expose out of nowhere. If you have clicked on…

37 minutes ago

Remove News-xvagoda.cc Pop-up Ads

About News-xvagoda.cc News-xvagoda.cc pop-ups can not introduce out of nowhere. If you have actually clicked…

39 minutes ago

Remove Wadverants.co.in Pop-up Ads

About Wadverants.co.in Wadverants.co.in pop-ups can not introduce out of nowhere. If you have clicked some…

41 minutes ago

Remove Unbosperismoles.co.in Pop-up Ads

About Unbosperismoles.co.in Unbosperismoles.co.in pop-ups can not introduce out of nowhere. If you have actually clicked…

3 hours ago

Remove Ranshoof.com Pop-up Ads

About Ranshoof.com Ranshoof.com pop-ups can not launch out of nowhere. If you have clicked some…

1 day ago