Sophisticated BundleBot Malware Disguised as Google AI Chatbot and Utilities - The Hacker News
🥇 Bonuses, Promotions, and the Best Online Casino Reviews you can trust: https://bit.ly/BigFunCasinoGame
Sophisticated BundleBot Malware Disguised as Google AI Chatbot and Utilities - The Hacker News
Jul 21, 2023 THN Cyber Threat / Malware A new malware strain known as BundleBot has been stealthily operating under the radar by taking advantage of .NET single-file deployment techniques, enabling threat actors to capture sensitive information from compromised hosts.
"BundleBot is abusing the dotnet bundle (single-file), self-contained format that results in very low or no static detection at all," Check Point said in a report published this week, adding it is "commonly distributed via Facebook Ads and compromised accounts leading to websites masquerading as regular program utilities, AI tools, and games."
Some of these websites aim to mimic Google Bard, the company's conversational generative artificial intelligence chatbot, enticing victims into downloading a bogus RAR archive ("Google_AI.rar") hosted on legitimate cloud storage services such as Dropbox.
The archive file, when unpacked, contains an executable file ("GoogleAI.exe"), which is the .NET single-file, self-contained application ("GoogleAI.exe") that, in turn, incorporates a DLL file ("GoogleAI.dll"), whose responsibility is to fetch a password-protected ZIP archive from Google Drive.
The extracted content of the ZIP file ("ADSNEW-1.0.0.3.zip") is another .NET single-file, self-contained application ("RiotClientServices.exe") that incorporates the BundleBot payload ("RiotClientServices.dll") and a command-and-control (C2) packet data serializer ("LirarySharing.dll"). "The assembly RiotClientServices.dll is a custom, new stealer/bot that uses the library LirarySharing.dll to process and serialize the packet data that are being sent to C2 as a part of the bot communication," the Israeli cybersecurity company said.
The binary artifacts employ custom-made obfuscation and junk code in a bid to resist analysis, and come with capabilities to siphon data from web browsers, capture screenshots, grab Discord tokens, information from Telegram, and Facebook account details.
Check Point said it also detected a second BundleBot sample that's virtually identical in all aspects barring the use of HTTPS to exfiltrate the information to a remote server in the form of a ZIP archive.
"The delivering method via Facebook Ads and compromised accounts is something that has been abused by threat actors for a while, still combining it with one of the capabilities of the revealed malware (to steal a victim's Facebook account information) could serve as a tricky self-feeding routine," the company noted. The development comes as Malwarebytes uncovered a new campaign that employs sponsored posts and compromised verified accounts that impersonate Facebook Ads Manager to entice users into downloading rogue Google Chrome extensions that are designed to steal Facebook login information.
Users who click on the embedded link are prompted to download a RAR archive file containing an MSI installer file that, for its part, launches a batch script to spawn a new Google Chrome window with the malicious extension loaded using the "--load-extension" flag - start chrome.exe --load-extension="%~dp0/nmmhkkegccagdldgiimedpiccmgmiedagg4" "https://www.facebook.com/business/tools/ads-manager" UPCOMING WEBINAR Shield Against Insider Threats: Master SaaS Security Posture Management Worried about insider threats? We've got you covered! Join this webinar to explore practical strategies and the secrets of proactive security with SaaS Security Posture Management. Join Today "That custom extension is cleverly disguised as Google Translate and is considered 'Unpacked' because it was loaded from the local computer, rather than the Chrome Web Store," Jérôme Segura, director of threat intelligence at Malwarebytes, explained, noting it is "entirely focused on Facebook and grabbing important pieces of information that could allow an attacker to log into accounts."
The captured data is subsequently sent using the Google Analytics API to get around content security policies (CSPs) to mitigate cross-site scripting (XSS) and data injection attacks.
The threat actors behind the activity are suspected to be of Vietnamese origin, who have, in recent months, exhibited acute interest in targeting Facebook business and advertising accounts. Over 800 victims worldwide have been impacted, with 310 of those located in the...
-
10:23
Sideserf Cake Studio
1 hour ago2 Easy Hyperreaslitic Cakes YOU Can Make!
34 -
13:46
Tactical Advisor
1 day agoCan a Gun This Small Be Any Good? Smith & Wesson Bodyguard 2.0
3793 -
59:51
Trumpet Daily
22 hours agoWhat Is Kamala Harris Trying to Say? - Trumpet Daily | Sept. 20, 2024
2.79K6 -
1:01:22
The Christopher Prosch Show
16 hours agoAre the National Polling Institutions lying to you!??
82 -
13:34
Ethical Preparedness
16 hours agoThe Cannibals Attack: The Fatal Cost He Paid in His Battle Against Marauders -Post Collapse Medicine
1712 -
1:45
Memology 101
15 hours agoKamala's EX calls her critics MENTALLY ILL people who will end up "EATING OUT OF GARBAGE CAN[S]"
69311 -
3:42
Brownells, Inc.
21 hours agoQuick Tip: The RIGHT Way To Use the Forward Assist
3843 -
1:13:32
Bright Insight
13 hours agoAncient Apocalypse Season 2 UPROAR w/ Illegitimate Scholar
79.9K53 -
1:15:15
Havoc
16 hours agoTainted Careers & Tarnished Legacies | Stuck Off the Realness Ep. 14
134K17 -
1:05:33
Glenn Greenwald
1 day agoJournalist Chris Hedges on Media, Terror, Gaza, and More | SYSTEM UPDATE #338
118K162