Hackers infected 18,000 'script kiddies' using a fake malware generator.

0 22
CloudSEK's security researchers report that the malware has infected 18,459 devi...

Hackers infected 18,000 'script kiddies' using a fake malware generator.

CloudSEK's security researchers report that the malware has infected 18,459 devices worldwide, most of which are located in Russia, the United States, India, Ukraine, and Turkey.

CloudSEK's report states: 'A Trojanized XWorm RAT generator has been weaponized and spread.'It is specifically aimed at those who are just starting to touch on cybersecurity, script kiddies.These people directly download and use various tools mentioned in the tutorials, indicating that 'thieves have their code' does not exist.

CloudSEK found that the malware contains a 'kill switch' for uninstalling the malware from many infected devices. However, due to the limitations of actual operations, some devices are still in an infected state.

Location of infected devicesLocation of infected devicesSource: CloudSEK

Fake RAT generator implants malware

Researchers say they recently discovered a Trojanized XWorm RAT generator that spreads through various channels, including GitHub repositories, file hosting platforms, Telegram channels, YouTube videos, and websites.

These channels promote the RAT generator, claiming that other threat actors can use the malicious software for free. However, it is not a real XWorm RAT generator but rather an infected device of a threat actor.

Once the device is infected, the XWorm malware checks the Windows registry to determine if it is running in a virtualized environment. If it confirms a virtual environment, the malware will stop running. If the host meets the infection conditions, the malware will make the necessary modifications to the registry to ensure it continues to run after the system restarts.

Each infected system is registered to a Telegram-based command and control (C2) server with a hardcoded Telegram bot ID and token. The malware also automatically steals Discord tokens, system information, and location data (via IP address) and sends them to the C2 server, then waits for the operator's instructions.

Among the total of 56 supported commands, the following are particularly dangerous:

  • /machine_id*browsers– Steal passwords, Cookies, and auto-fill data saved in the browser
  • /machine_id*keylogger– Record all content entered by the victim on the computer
  • /machine_id*desktop– Capture the current screen of the victim
  • /machine_idencrypt – Encrypt all files on the system using the provided password
  • /machine_idprocesskill – Terminate specific running processes, including security software
  • /machine_idupload – Steal specific files from the infected system
  • /machine_id*uninstall– Remotely uninstall malicious software from the device

CloudSEK found that malicious software operators stole data from about 11% of the infected devices, mainly by capturing screenshots of infected devices (as shown below) and stealing browser data.

Hacker's desktop screenshotHacker's desktop screenshotSource: CloudSEK

Destroying the botnet using the termination switch

CloudSEK researchers unloaded malicious software from infected devices by using hardcoded API tokens and built-in 'termination switches' to destroy the botnet.

For this, they sent batch uninstall commands to all listening clients, iterating through all known device IDs extracted from the Telegram logs. They also assumed that the device ID followed a simple numeric pattern and tried brute-forcing IDs from 1 to 9999.

Send uninstall commandSource: CloudSEK

Although this operation successfully removed malicious software from many infected devices, devices that were not online when the command was issued are still infected. In addition, Telegram has a limit on the rate of message sending, so some uninstall commands may be lost during transmission.

The scenario of hackers attacking hackers is not uncommon in reality. The research results of CloudSEK remind us that we should never trust unsigned software, especially those distributed by other cybercriminals, and malicious software generators should only be installed in test/analysis environments.

Reference source:

Hacker infects 18,000 "script kiddies" with fake malware builder

你可能想看:

Common attack methods used to conceal real IP addresses in network attacks and methods for tracing and tracing false IP addresses

Distributed Storage Technology (Part 2): Analysis of the architecture, principles, characteristics, and advantages and disadvantages of wide-column storage and full-text search engines

(3) Is the national secret OTP simply replacing the SHA series hash algorithms with the SM3 algorithm, and becoming the national secret version of HOTP and TOTP according to the adopted dynamic factor

A Brief Discussion on the Establishment of Special Security Management Organizations for Operators of Key Information Infrastructure

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

How to use SystemInformer to monitor system resources, debug software, and detect malware

As announced today, Glupteba is a multi-component botnet targeting Windows computers. Google has taken action to disrupt the operation of Glupteba, and we believe this action will have a significant i

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

Fake Google ads target Microsoft ad accounts, and malware attacks are upgraded again

Git leak && AWS AKSK && AWS Lambda cli && Function Information Leakage && JWT secret leak

最后修改时间:
admin
上一篇 2025年03月29日 12:00
下一篇 2025年03月29日 12:23

评论已关闭