Weaponized Windows Installers Target Graphic Designers in Crypto Heist

  /     /     /  
Publicated : 23/11/2024   Category : security


Weaponized Windows Installers Target Graphic Designers in Crypto Heist


Attackers use legitimate Windows installer to hide malicious scripts that install a backdoor and miners that leverage victims graphics processing power.



Attackers are targeting 3D modelers and graphic designers with malicious versions of a legitimate Windows installer tool in a
cryptocurrency-mining
campaign thats been ongoing since at least November 2021.
The campaign abuses Advanced Installer, a tool for creating software packages, to hide malware in legitimate installers for software used by creative professionals — such as Adobe Illustrator, Autodesk 3ds Max, and SketchUp Pro, according to a report by Cisco Talos Threat Researcher Chetan Raghuprasad published this week.
Attackers execute malicious scripts through a feature of the installer called Custom Action, dropping several payloads — including the M3_Mini_Rat client stub backdoor, Ethereum
cryptomining
malware PhoenixMiner, and multi-coin mining threat lolMiner.
Most of the campaigns software installers were written in French, which makes sense as most of the victims are in France and Switzerland, according to the post. However, the campaign also targeted victims in the US, Canada, Algeria, Sweden, Germany, Tunisia, Madagascar, Singapore, and Vietnam.
Organizations affected are those that typically employ professionals working in 3D modeling and graphic design, including verticals such as architecture, engineering, construction, manufacturing, and entertainment.
Attackers likely targeted these sectors because they use computers with high GPU specifications and powerful graphics cards, which are useful for generating cryptocurrency, Raghuprasad wrote.
Cisco Talos could not determine the initial attack method for how the weaponized software installers were delivered to infected machines. In the past, we have commonly seen such trojanized installers delivered using the search engine optimization (SEO) poisoning, Raghuprasad acknowledged.
Once delivered, attackers used two multi-stage attack methods for loading malware. The first attack method installs the M3_Mini_Rat client stub to establish a backdoor to the victims machine, while the second implants PhoenixMiner and lolMiner for
cryptomining
.
The first attack sequence starts when a victim clicks on a legitimate software installer, which the attacker bundled with a malicious script using Advanced Installer. The attack abuses Advanced Installers Custom Action feature to execute the dropped malicious batch file, which contains a command to configure the task scheduler in the victims machine.
The attack vector also drops a malicious PowerShell loader script and an encrypted file, the M3_Mini_RAT client stub. The task created by the original batch file runs every minute to execute the malicious PowerShell loader script, which generates the M3_Mini_Rat client stub and runs it in the victims machine memory.
M3_Mini_Rat then attempts to connect to the attackers command-and-control (C2); however, the C2 was unresponsive in the attack that researchers observed, so they did not see any cryptomining payloads dropped.
The second attack method also abuses Advanced Installer and its Custom Actions feature to drop malicious batch scripts, proceeding with an attack that deviates slightly from the first attack but ultimately downloads PowerShell loaders for executing malicious payloads. The researchers managed to observe the launch of the PhoenixMiner and lolMiner from PowerShell in this attack vector.
Several aspects of the campaign are unique in terms of other
cryptomining attacks,
Raghuprasad tells Dark Reading. Attackers use of PhoenixMiner — a payload that takes over a systems GPU to mine crypto — creates a distinct level of evasion because the miner also can be intentionally installed by the users.
This poses challenges for the defense systems to classify [the attack] unless they consider other observables of the attack chain, Raghuprasad says.
Attackers also have increased their likelihood of financial gain through the use of lolMiner, which gives them the option to mine several cryptocurrencies at the same time, he says.
Further, the employment of the M3_Mini_RAT, which has remote administration capabilities that mainly focus on performing system reconnaissance, provides valuable insight into the victims environment and could portend future attacks.
Its capability of downloading and executing other binary increases the likelihood of follow-on payloads, [such as] other malicious executables or arbitrary commands, Raghuprasad says.
With a
recent report
finding that the lure of
cashing in on cryptocurrency
sent these types of attacks skyrocketing last year, its important that organizations remain vigilante to current attack targets and methods, Raghuprasad says.
The Advanced Installer campaign showed attackers pivoting from their typical targets — namely, gamers — as well as a novel use of legitimate installers to achieve their ultimate goal, he says.
Organizations and users should be aware that threat actors are constantly looking for new avenues to compromise the victims and exploit them, he says. This is why you want a defense-in-depth approach and need to run things like endpoint security to try and avoid these types of malicious installers.
In fact, users should be vigilant in general while downloading the software installers, making a point to download them only from a legitimate and trusted source, Raghuprasad says.
Its also important that organizations use legitimate copies of applications and not just conduct Web searches for them and download the top result, which could be a malicious ad, he adds.

Last News

▸ CryptoWall is more widespread but less lucrative than CryptoLocker. ◂
Discovered: 23/12/2024
Category: security

▸ Feds probe cyber breaches at JPMorgan, other banks. ◂
Discovered: 23/12/2024
Category: security

▸ Security Problem Growing for Dairy Queen, UPS & Retailers, Back off ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Weaponized Windows Installers Target Graphic Designers in Crypto Heist