Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
According to recent reports, suspected Russian threat actors have been targeting users in the crypto industry in Eastern Europe with fake job opportunities. The attackers are using these job offers as a lure to trick users into downloading and installing malware onto their systems, which is designed to steal sensitive information such as login credentials and cryptocurrency wallet keys.
Recent reports suggest that alleged Russian threat actors have been using multiple highly obfuscated and under-development custom loaders to deliver the Enigma info-stealing malware. Enigma is a type of malware that is designed to steal sensitive information, including cryptocurrency wallet data, login credentials, and personal information. The use of custom loaders by the attackers makes it more difficult for traditional antivirus and cybersecurity measures to detect and block the malware.
The attackers are also exploiting a known vulnerability in an Intel driver (CVE-2015-2291) to conduct BYOVD (Bring Your Own Vulnerable Device) attacks, which allows them to reduce the token integrity of Microsoft Defender and bypass security measures.
The attackers are said to be using a rogue RAR archive file that is distributed via phishing or social media platforms. The archive file contains two documents, one of which is a .TXT file that includes a set of sample interview questions related to cryptocurrency.
When the victim opens the .TXT file, it contains a hyperlink that redirects them to a malicious website that downloads the Enigma info-stealing malware.
“To download the next stage payload, the malware first sends a request to the attacker-controlled Telegram channel https://api[.]telegram[.]org/bot{token}/getFile to obtain the file_path. This approach allows the attacker to continuously update and eliminates reliance on fixed file names.”
UpdatTask.dll, the second-stage malware, is a C++ dynamic-link library (DLL) with two export functions, DllEntryPoint, and Entry. This payload disables Microsoft Defender by exploiting the CVE-2015-2291 flaw using the BYOVD approach. The malware next downloads and runs the third-stage payload, which downloads the Enigma Stealer.
The Enigma stealer is a type of malware that is capable of harvesting sensitive information, recording keystrokes, and capturing screenshots. The stolen data is then exfiltrated through the messaging app Telegram. The malware is designed to target various web browsers and applications, including Google Chrome, Microsoft Edge, Microsoft Outlook, Telegram, Signal, OpenVPN, and others. The Enigma stealer can be used to steal a wide range of sensitive information, including login credentials, financial information, and personal data.
Similar to recent campaigns, the Fake employment offers method is also used by the North Korean-backed Lazarus Group in its crypto-attacks. Russian threat actors’ use of this tactic demonstrates a continuous and lucrative attack vector.
“Furthermore, this case highlights the evolving nature of modular malware that employ highly obfuscated and evasive techniques along with the utilization of continuous integration and continuous delivery (CI/CD) principles for continuous malware development.” they conclude.
To protect themselves against the recent Enigma malware campaign, organizations should remain vigilant against phishing attacks and educate their employees about the risks of clicking on suspicious links or opening unsolicited email attachments. Individuals should also be cautious of social media posts or phishing attempts that offer job opportunities, especially during times of economic uncertainty.
Automated page speed optimizations for fast site performance