Connect with us

Hi, what are you looking for?

Hard News Hard Hitting News Source Global Political News

Cyber Security

New Horabot Malware Steals Banking and Outlook Credentials

Since November 2020, a covert campaign utilizing the ‘Horabot’ botnet malware has specifically targeted Spanish-speaking users across Latin America, infecting them with a banking trojan and spam tool, all while operating undetected.

Threat actors take control of the victim’s email accounts (Gmail, Outlook, Hotmail, or Yahoo) by exploiting the malware to steal all the essential and confidential email data.

Not only that, even threat actors also use those compromised email accounts to send phishing emails to other victims.

Cybersecurity researchers at Cisco Talos recently uncovered this new Horabot operation, revealing that the threat actor responsible for it is believed to have roots in Brazil.

However, most of the infections are located in the following countries:-

  • Mexico
  • Uruguay
  • Brazil
  • Venezuela
  • Argentina
  • Guatemala
  • Panama

Horabot Malware Infection Flow

The infection chain commences with a multi-stage process, initiated by a phishing email with a tax-related theme, wherein the target receives an HTML attachment masquerading as a payment receipt.

Once the HTML is opened, it triggers a sequence of URL redirections, ultimately leading the victim to an HTML page. At the same time, this HTML page is hosted on an AWS instance under the threat actor’s control.

The unsuspecting victim falls into the trap after clicking laid by the threat actor, as it downloads a RAR archive carrying a CMD extension-embedded batch file.

The batch file directs the download of a PowerShell script, which retrieves a collection of authorized executables and trojan DLLs from C2.

Executing their operations precisely, these trojans connect to a separate C2 server, retrieving the final two payloads. 

One of these payloads is a PowerShell downloader script, while the other is the Horabot binary.

Horabot Malware

The malicious PowerShell downloader script takes charge by launching a sequence of processes responsible for the retrieval of the payloads, and not only that even it also forcefully reboots the system of the victim as well.

Targets Login Credentials & Financial Information

Hidden within the array of DLL files extracted from the downloaded ZIP archive, the notorious “jli.dll” stealthily sideloads itself through the “kinit.exe” executable, unveiling its true identity as a Delphi-based banking trojan.

While it targets the following data:-

  • System language
  • Disk size
  • Antivirus software
  • Hostname
  • OS version
  • IP address
  • User credentials
  • Activity data

In addition, the trojan extends its reach by providing its operators with remote access functionalities, granting them the power to execute file actions, engage in keylogging activities, capture screenshots, and track mouse events.

With each application launch, the trojan executes a strategic trick, expertly overlaying a deceptive window to mislead victims into inputting sensitive data.

Horabot Malware

The attacker stealthily employs HTTP POST requests to convey all the gathered information from the victim’s computer to their command and control server, ensuring a covert and efficient data transfer.

An encrypted spam tool DLL is also included with the ZIP archive, and the tool is dubbed as “_upyqta2_J.mdat.” This tool gives the attacker ability to steal credentials from popular email platforms like:-

  • Gmail
  • Hotmail
  • Yahoo

Operating within its designated role, Horabot emerges as a PowerShell-based botnet program specializing in Outlook phishing. 

This malicious entity can increase the infection by sending phishing emails to every email address in the victim’s mailbox.

Advertisement. Scroll to continue reading.

Upon completing the phishing email distribution process, all locally generated files and folders are deleted, leaving no trace.

Copyright 2021 Associated Press. All rights reserved.

Source: https://cybersecuritynews.com/horabot-malware/

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Cyber Security

In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered.  The attackers behind this campaign...

Cyber Security

According to recent reports, a threat actor has compromised the confidential information of 3,200 Airbus vendors. The exposed data includes sensitive details such as...

Cyber Security

A group of Researchers unearthed critical code Proton Mail vulnerabilities that could have jeopardized the security of Proton Mail, a renowned privacy-focused webmail service. ...

Cyber Security

Telegram Messenger offers global, cloud-based instant messaging with several features:- Cybersecurity researchers at Securlist recently found several Telegram mods on Google Play in various...

Copyright © 2023 Hard News Herd Hitting in Your Face News Source | World News | Breaking News | US News | Political News Website by Top Search SEO