in ,

Fake veteran hiring site downloads spyware instead of jobs, Ars Technica

Fake veteran hiring site downloads spyware instead of jobs, Ars Technica


    

      Bad job –

             

Lookalike domain to legitimate site offers a free desktop app. But it’s a trap.       

          –

  

        

This site will not make America safer.

Enlarge/This site will not make America safer.

A “threat group” previously identified as being behind a set of attacks on IT providers in Saudi Arabia has now been spotted targeting US military veterans and companies with a malicious web page that purports to be an employment site. According to areport posted todayby Cisco Talos researchers Warren Mercer, Paul Rascagneres, and Jungsoo An, the site offers a free desktop client — which is in fact a spyware installer.

Symantec identified the group ina threat intelligence postearlier this month. Called Tortoiseshell, the group has been connected with attacks on 11 companies, the majority of which are located in Saudi Arabia. All of the attacks used the same remote access tool, Backdoor.Syskit by Symantec, coded in both Delphi (the Object Pascal programming language originally introduced by Borland) and Microsoft .NET.

A very similar backdoor is part of a package dropped by the website discovered by Talos, hiremilitaryheroes.com. Still live, the site itself has no content other than three links to “try our desktop app for free” —for Windows 10, Windows 8.1 and Windows 8. The “app” is a fake installer, which, when the malware installation is complete, displays an error message that claims “your security solution is terminating connections to our servers.”

While it’s running, the installer checks to see if it can reach Google — a measure to check to see if it is being run in a security sandbox. If it can’t, it shuts down. But if it connects, it downloads two files from a server hosted by a company in Atlanta: a reconnaissance tool and the backdoor. If something fails during the download, the installer sends an email to a Gmail address from another Gmail address (ericaclayton 2020 @ gmail.com), the credentials for which are hard-coded in the installer.

      

      

  •             
                                  
                                          

                          The fake installer completes …

                                                        

  •                   

  •             
                                  
                                          

                          … and then blames your security settings.

                                                        

  •               

  

The reconnaissance tool, with the filename “bird.exe”, is internally named Liderc — a mythical being from Hungarian folklore that evolves from a chicken into a succubus. It performs a thorough collection of data about the system it was installed on, including date, time, installed drivers, patch level, network configuration, domain controller, name of the administrator account, and a list of other accounts available. It also checks the screen size via Windows Management Instrumentation, likely to again check if it is running in a sandbox. All this data is pushed back to the attacker, who could use it to craft attacks.

The backdoor, named “IvizTech” in this case, can execute commands on the infected system, upload and download files, use PowerShell to unzip and execute downloaded code, and — when commanded — uninstall and remove itself. The backdoor doesn’t work without the installer, as it receives the IP address of the command-and-control server as an execution argument when launched by the installer, a measure likely taken to prevent malware investigators from discovering the server.

                                 

                  

Brave Browser
Read More
Payeer

What do you think?

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

Magecart skimmers seen targeting routers for customer Wi-Fi networks, Ars Technica

Magecart skimmers seen targeting routers for customer Wi-Fi networks, Ars Technica

PM, Amit Shah Targets In Terror Plan, Warns Intel; Air Bases On Alert – NDTV News, Ndtv.com

PM, Amit Shah Targets In Terror Plan, Warns Intel; Air Bases On Alert – NDTV News, Ndtv.com