Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
JSOutProx is an advanced attack framework that combines both JavaScript and .NET components. Its operation involves leveraging the .NET serialization feature to communicate with a core JavaScript file running on the victim’s machine. When the malware is executed on the victim’s system, the framework gains the ability to load various plugins that execute additional malicious activities.
Recently, in the context of monitoring threat campaigns related to the payments fraud disruptions, Visa PFD experts discovered a new malware sample associated with a known eCrime threat group. The campaign, known as JSOutProx Malware, came to their attention on 26th July 2023.
This threat group is specifically involved in phishing campaigns, targeting financial institutions in regions like Africa, the Middle East, South Asia, and Southeast Asia. The JSOutProx RAT Malware is a highly obfuscated JavaScript backdoor that was first identified in December 2019. Notably, it possesses modular plugin capabilities, enabling it to execute various malicious actions.
The capabilities of the JSOutProx RAT Malware include running shell commands, downloading and uploading files, manipulating the file system, establishing persistence on the infected system, taking screenshots, and manipulating keyboard and mouse events.
One distinct feature of this malware is its utilization of the Cookie header field during its command-and-control (C2) communication. During the initialization process, the malware gathers different types of information, which are then separated by the delimiter “|”, concatenated, hex encoded, and set within the Cookie header field.
Overall, this discovery highlights the ongoing sophistication and adaptability of eCrime threat groups, particularly in the context of targeting financial institutions across multiple regions. The use of highly obfuscated JavaScript backdoors and unique communication methods further demonstrates the need for heightened vigilance and cybersecurity measures in the payments ecosystem to counter such threats effectively.
Financial institutions in targeted regions are at significant risk of compromise due to JSOutProx’s advanced capabilities and adaptability. The malware’s stealthy execution and obfuscation make it difficult to detect and mitigate, allowing threat actors to conduct extended espionage campaigns against victims.
The JSOutProx threat underscores the ongoing evolution of eCrime threat groups and their ability to target financial institutions across diverse regions. By adopting proactive security measures and maintaining a high level of vigilance, organizations can effectively defend against this sophisticated malware and reduce the risk of compromise in the payments ecosystem.