text
stringlengths
0
383k
New version of Aberebot in the wild and source code for sale Android malware known as Aberebot is able to steal users credentials of multiple banks, social media accounts and cryptocurrency services by overlaying phishing pages when it notices a user's activity and interaction with certain apps and websites (leveraging Accessibility Service). It's also able to perform classic actions such as collecting sensitive device information, stored files, contacts and SMS. Recent reports indicate that a new version of this malware has been seen in the mobile threat landscape. Aberebot was actively advertised on underground forums for $7000, although in newer posts, the malware author appears to have discontinued its development, instead opting to sell a lifetime license for $300 and the source code for $3000. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk
New version of CopperStealer in-the-wild CopperStealer is relatively new, being first observed earlier this year on websites that host fake cracked software. The author behind this run-of-the-mill infostealer continues to improve it and a new version has been spotted in-the-wild. Over the last few weeks the modus operandi hasn't changed, continuing to make consumers the main target. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Trojan Horse Network-based System Infected: Trojan.Backdoor Activity 564 System Infected: Trojan.Backdoor Activity 634 Machine Learning-based Heur.AdvML.B
New version of GoMet backdoor targets organizations in Ukraine A new variant of the GoMet backdoor has been discovered in campaigns targeting organizations in Ukraine. GoMet, as the name suggests, is written in the Go programming language and includes functionality for remote command execution as well as file upload/download. The malware has the ability to run scheduled cron jobs thereby ensuring a constant connection to the attacker's C2 servers Symantec protects you from this threat, identified by the following: File-based Trojan Horse Web-based Observed IPs are covered under security categories
New VileRAT variant in the wild A new variant of the VileRAT malware, linked to the DeathStalker (Evilnum) threat group, has been discovered in the wild. Programmed in Python, VileRAT exhibits features such as remote access, keylogging, remote command execution, and information gathering. The most recently observed campaigns leverage NSIS installers and VileLoader malware to deliver VileRAT payloads. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Dropper!gen2 File-based Trojan.Dropper Trojan Horse Trojan.Gen.MBT WS.Malware.1 WS.Reputation.1 Machine Learning-based Heur.AdvML.A!500 Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New "Vizom" malware targets Brazilian online banking Symantec Security Response is tracking malware dubbed "Vizom" which is endangering online banking users in Brazil. This new banking malware is not only designed to steal banking-related credentials from the infected machine, but also acts as a Remote Admin Tool (RAT) and keylogger. Symantec detects Vizom as the following: File-based protection Trojan.Gen.MBT Trojan Horse
New Voice Message PDF attachment phishing In a recent phishing run, emails containing a PDF attachment posing as a voice message notification has been sent to recipients. The PDF contains the format of a "new voice message received" template with criteria outlining the caller ID, message length, and a voicemail preview which defaults with a "Unfortunately, the transcript for this message is unavailable at this moment". The call to action is for the recipient to click the phishing URL to "Listen to the voice message". Email Headers: Subject: New Voice Message Attached from <call number> - WIRELESS CALLER Attached File-name: Voicemail(1).pdf Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products File-based Trojan.Pidief Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New wave of malspam spreading IcedID malware IcedID also known as Bokbot is a malware first observed around 2017. Historically IcedID was mainly a banking trojan, but with time its focus shifted on being a loader for follow-on infections of various payloads including ransomware. New malspam campaigns distributing IcedID have been observed in the wild just this week. The infection chain involved emails containing .PDF attachments disguised as invoice notices with filenames such as "INV-Details-JUL23.pdf" or "Scan_Doc_07-26.pdf". The PDF documents contained a link redirecting the victims to a download of a compressed and password-protected zip archive. Upon extracting and running the executables within, the IcedID payload was being delivered to the victims. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.IcedID!g4 Email-based Coverage is in place for Symantec’s email security products. File-based Scr.IcedID!gen3 Scr.Malcode!gdn28 Scr.Malpdf!gen2 Trojan.Gen.MBT Trojan Horse WS.Malware.1 Machine Learning-based Heur.AdvML.C Network-based System Infected: Trojan.Backdoor Activity 634 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New wave of snowshoe spam comes with fake product promotions Threat actors have come up with a new trick to flood and spam users by designing and executing a new wave of snowshoe campaigns. These snowshoe runs have recently appeared on the radar with an abuse of sa.com. Sa.com is a subdomain of .COM for the Kingdom of Saudi Arabia. Randomized domain names registered around the year 1998 are abused in this particular campaign. In general, snowshoe runs appear in small bursts of email volume. Contrarily in this case, Symantec observed a single outburst of over one million emails spanning over various fake product promotions. These detected emails showcase the attackers tactics to lure recipients into falling for such "too good to be true" offers. The email subjects entice recipients to open them and initiate a click bait reaction. Listed below are few of the observed email subjects: Increase your Internet speed with this WIFI Booster! Track Your Vehicle in Real-Time - Anywhere! Goodbye to Painful Aches - Get Relief Now Get a Brighter Smile in Just 7 Days! Track of your health with this SmartWatch! Your Virtual Concierge is Here! 4K Drone - Get Professional Quality Video for a Low Price! Simple 7-second "Fungus Vanishing" Ritual Clears Nails 3X Faster This Solar powered flashlight is life saving! This Device Translates 36 Languages Instantly! 3 Days to Control Blood Sugar - It's Possible! Natural Way of Regrowing Hair ! Portable Vacuum Cleaner, Take Anywhere! Say Goodbye To Lower Back Pain ! Do you want to find a solution to fight back lurking thieves? Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New wave of Zloader Late last year, a new variant of the infamous Zeus banking malware called Zloader showed up and has continued its dirty work via a multitude of spam campaigns. The group behind this variant has been very active in the maintenance and development of their malware resulting in multiple different versions this year. In September and October we observed a spike in Zloader activities, with a number of new command-and-control servers associated with these recent spam campaigns. Symantec has the following protections against Zloader: File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT W97M.Downloader Heur.AdvML.B Heur.AdvML.C WS.Malware.1 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
New Xloader campaign leverages steganography Xloader is a re-branded variant of the infamous Formbook infostealer. Like its predecessor, Xloader's purpose is to steal credentials and web browser cookies, log keystrokes on the compromised machine as well as take screenshots and steal other sorts of user's data. A new campaign has been identified that leverages spam emails with .pdf attachments during the initial execution stage. Further up the infection chain additional embedded malicious documents in .xlsx and .rtf formats are also used. This Xloader distribution campaign also makes use of steganographic techniques to hide malicious content in bitmap files. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products File-based Packed.Generic.661 Scr.Malcode!gdn30 Trojan Horse Trojan.Formbook Trojan.Gen.MBT Trojan.Gen.NPE Trojan.Mdropper Machine Learning-based Heur.AdvML.B Web-based Observed IPs/domains are covered under security categories
New Zebrocy Activity The malware group known as Zebrocy (aka Earworm) has been active for a while now, and have been involved with intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia. The group use spear-phishing emails to compromise their targets and infect them with malware. More recently, there has been new activity and researchers have shed light on one of the attack stages related to that activity, in this case the dropper. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.C ISB.Downloader!gen68 ISB.Dropper!gen1 WS.Malware.1 Behavior-based SONAR.MalTraffic!gen3 SONAR.MSWord!g7
New Zloader trojan exploiting Microsoft’s Signature Verification in the wild A new campaign involving the Zloader, a banking malware designed to steal user credentials has been observed in the wild. The malware exploits Microsoft’s signature verification mechanisms to inject its payloads into signed system DLL to hide its presence on the infected system. A legitimate remote monitoring and management software called Atera is used as part of this infection chain, the same software was reported to be used by the Conti ransomware group to gain persistence and remote access. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.MBT Trojan.Malfilter Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
Nexus Android banking malware Nexus is a new banking malware developed for the Android platform and sold in the form of a Malware-as-a-Service (MaaS) subscription. Source code similarities and some overlap of the executed commands indicate that Nexus might be an evolution of the well known SOVA banking malware. Nexus is able to perform Account Takeover (ATO) attacks in which the attackers take ownership over the online banking or cryptocurrency accounts with help of stolen credentials, SMS interception or takeover of 2FA codes. Symantec protects you from this threat, identified by the following: Mobile-based Android.Reputation.2 AppRisk:Generisk Web-based Observed domains/IPs are covered under security categories
Ngioweb botnet targeting IoT devices Recent online reports suggest that Ngioweb malware is in the wild. Ngioweb is a Linux malware that infects vulnerable IoT devices in order to construct a botnet. Symantec detects this malware as follows: File-based Trojan Horse Trojan.Gen.NPE
Nibiru ransomware threatens its own catastrophe Nibiru, a.k.a. Planet X, is a large planetary object that is believed will hit the Earth sometime in the 21st century bringing about much destruction. A new ransomware that has been named after the doomsday harbinger is destined to have a similarly catastrophic effect on the files on an infected machine. It also aims to destroy the victim's financial state as its ransom is set at an astronomical $4.5 million worth of Bitcoin. Files encrypted by Nibiru ransomware will have a standard .nibiru file extension. Symantec protects users from Nibiru ransomware as follows: File-based Ransom.Cryptolocker
NicoMiner - a new Monero coinminer Symantec Security Response has been aware of the released report about a new coinminer dubbed as NicoMiner. This Monero mining malware has been observed to be distributed via exploitation of various vulnerabilities and it targets both Windows and Linux platforms. Symantec has the following coverage in place for the NicoMiner malware: File-based Trojan.Gen.2 Trojan.Gen.MBT Trojen.Gen.NPE Trojan Horse WS.Malware.1
Nightingale Stealer Nightingale is yet another stealer with run-of-the-mill capabilities that has recently been observed advertised on various platforms and also used in cybercrime attacks (drive-by-download). If someone is successfully lured into executing this threat, among other things it will gather data, including browser, crypto wallet, and system specifications. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Dropper File-based Trojan.Gen.MBT
NimzaLoader - new malware associated with TA800 discovered According to a recent report, a new malware dubbed NimzaLoader has been discovered. NimzaLoader is written in the Nim programming language and has been associated with the activities of the TA800 APT group. The malware functionalities include executing powershell commands and injecting shellcode into processes among others. Symantec provides the following detection against NimzaLoader: File-based Trojan.Gen.MBT
Nitol DDoS malware leveraged for Amadey bot distribution Nitol malware has been leveraged to install the Amadey bot in some recent campaigns. Nitol is a well known DDoS malware that support several different DDoS attack executions. The malware may also download additional payloads or run updates depending on the commands received from the C2 servers. The Amadey bot distributed in the reported campaigns might be further used by the threat actors to collect data from the infected endpoints or to download yet more malicious payloads. Symantec protects you from this threat, identified by the following: File-based MSIL.Downloader!gen8 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based System Infected: Backdoor.Nitol Activity System Infected: Trojan.Backdoor Activity 634 Web-based Observed domains/IPs are covered under security categories
Nitrogen, initial access malware infects through malvertising Nitrogen is a malware family used for initial access to the victims machine. The infection comes through malvertising, abusing paid ads on search engines masquerading as legitimate sources for popular software. From the fake but legitimate-looking site, the victim will download an ISO file with an installer which will install the legitimate software the person was looking for, as to avoid initial suspicion, along with a Python running environment and a malicious Python package. Using the Python module installed, the next step will secure the access to the victim's machine connecting to the C2 servers, letting the threat actors know a new machine is infected and installing Meterpreter and possibly Cobalt Strike. After this, the threat actors could exploit the machine themselves or sell the access to other groups. Symantec protects you from this threat, identified by the following: File-based Meterpreter Trojan Horse Trojan.Emotet Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 WS.SecurityRisk.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Nitrogen malware delivery campaign A new malicious campaign spreading the Nitrogen malware has been observed in the wild. The attack leverages malvertising techniques via Google Ads and the malware binaries are masqueraded as PuTTY or FileZilla software installers. Nitrogen uses DLL sideloading to infect the targeted system. Once deployed this malware is generally used to gain initial access allowing network compromise and additional arbitrary payload deployments. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Rd32!g1 File-based Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Nitrokod - a cryptomining campaign A new cryptomining campaign dubbed Nitrokod has been reported to infect machines across 11 countries worldwide. The malware is distributed via free software available to download via multiple sharing sites. One of such applications is “Google Translate Desktop”, which once installed initiates a delayed multi-stage infection process ending up with XMRig miner payload. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen6 File-based Trojan Horse Trojan.Gen.2 WS.Malware.2 Machine Learning-based Heur.AdvML.B Web-based Observed domains are covered under security categories
Nitro ransomware Nitro is a run-of-the-mill ransomware variant initially discovered in 2021 and reportedly created for educational purposes only. New variants of this malware are occasionally found in the wild indicating it remains in use. Its' impact though seem to be pretty limited. In terms of ransom, instead of any payment Nitro asks for Discord Nitro subscription gift codes. Aside of the usual ransomware functionality, Nitro has also capability to steal Discord tokens from the infected machine. Symantec protects you from this threat, identified by the following: File-based Trojan Horse WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B
NjRAT, long of tooth, can still bite NjRAT is a run-of-the-mill remote access trojan that has been around since at least 2013 and as of today is still actively used by multiple groups and individuals. Over the years its source code and variants have been echoed countless times on social media, hosting services for software development and version control, as well as hacking websites and forums. Both consumers and enterprises have been the target of actors running malicious email and drive-by-download campaigns disguised as fake updates, cracked software, game mods and hacks. In recent weeks Symantec has observed a measurable uptick in the threat landscape. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Backdoor.Ratenjay Backdoor.Ratenjay!gen3 Downloader Trojan Horse Machine Learning-based Heur.AdvML.B
NjRAT and Nanocore are still waiting for those orders NjRAT (also known as Bladabindi or Ratenjay) and Nanocore belong to the most prevalent Remote Access Trojan families observed in the wild this year. Both RATs are commonly used to capture data from the compromised devices including grabbing keystrokes, collecting stored credentials or browser history etc. Just this week we have noticed interesting malspam runs that utilize fairly common "shipment tracking" or "fake order" themes. The payloads delivered in those runs have been determined either as NjRat or Nanocore. Email subjects: "Any news about this Order?" "Any news about this Order PV20035320 ?" "Please Update us on this Order" Email attachments: "dansk_order.rar" "PV20035320.rar" "rfq00092.rar" Symantec continuously monitors these threats in order to keep our customers protected against the latest variants. Below is our current protection for the samples and emails associated with the campaigns mentioned as well as other recently identified NjRAT and Nanocore samples. File-based: Backdoor.Ratenjay Backdoor.Ratenjay!gen3 Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse Trojan.Nancrat WS.Malware.1 WS.Malware.2 Email-based: Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Website-based This activity is proactively blocked by Symantec Web Isolation technology
NjRAT campaign: Spanish consulting, healthcare and energy industries targeted In Mid-November, Symantec observed an actor attempting to infect Spanish industries and organizations with a well-known remote access trojan that goes by the name NjRAT. The malicious emails (subject: ENVIO FACTURAS SOLICITADA (Facturas Nº:232683)) impersonate a German manufacturer of building materials - or its Spanish subsidiary to be more specific - in a bill-based social engineering scheme. In terms of victimology, they have primarily targeted consulting, healthcare, and energy-related companies. If a user happens to be lured, they will open the attached archive (FACTURAS.rar) and then the NjRAT binary (FACTURAS.exe) disguised as a fake bill. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Behavior-based ACM.Untrst-FlPst!g1 SONAR.SuspBeh!gen625 File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B!100
NjRAT remains active in the wild NjRat (also known as Bladabindi or Ratenjay) is one of the most widely used Remote Access Trojans (RATs) of the last decade. Symantec continues to observe the activities of this malware family also in 2022. NjRAT is used extract data from the compromised endpoints and this includes logged keystrokes, stored credentials, browser history etc. Some later NjRAT variants also target cryptocurrency wallets. This RAT furthermore allows the attackers to send commands via remote shell, manipulate the registry as well as download additional arbitrary files. Symantec protects you from this threat, identified by the following: File-based Backdoor.Ratenjay Backdoor.Ratenjay!gen2 Backdoor.Ratenjay!gen3 Downloader MSIL.Trojan!gen2 Packed.Generic.619 Scr.Malcode!gdn14 Trojan Horse Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based System Infected: Backdoor.Ratenjay RAT Activity System Infected: Trojan.Backdoor Activity 555 System Infected: Trojan.Backdoor Activity 634 Web-based Observed IPs/domains are covered under security categories
NjRAT spread across the Middle East and North Africa using geopolitical lures An active campaign using Middle Eastern geopolitical-themed lures to distribute NjRAT has been spotted across the Middle East and North Africa. Arabic speaking users are lured into downloading infected cab files hosted on compromised hosting servers. Opening the lure file infects the victims’ machines with a PowerShell script dropper which is responsible for loading the NjRAT binary into memory. NjRAT allows attackers to conduct malicious activities on infected systems such as log keystrokes, access the victim’s camera, steal credentials stored in browsers, open a reverse shell, upload/download files, perform process, file, and registry manipulations etc. Symantec protects you from this threat, identified by the following: File-based CL.Downloader!gen11 ISB.Downloader!gen80 ISB.Heuristic!gen5 Scr.Malcode!gen Trojan Horse Trojan.Gen.NPE VBS.Downloader.Trojan Email-based Coverage is in place for Symantec’s email security products Web-based Observed domains/IPs are covered under security categories
NJRAT targets Spanish-speaking users with fund and pension social engineering Pension and fund-themed social engineering attacks can be especially potent during times of economic turmoil, such as the ongoing aftermath of certain events in 2022. Symantec has recently detected a malicious email campaign targeting Spanish-speaking users that pretends to be a notification about a transfer of pension funds from a known Colombian financial company that administers pension and severance funds. The emails include a RAR archive attachment with two malicious VBS files, which, if opened, will infect the victim's device with the NJRAT remote access trojan. NjRat, also known as Bladabindi or Ratenjay, is a highly prevalent Remote Access Trojan (RAT) that has been used extensively over the past decade. It allows attackers to extract data from compromised devices including logged keystrokes, stored credentials, and browser history. Some newer variants of NjRat also target cryptocurrency wallets. In addition to data extraction, this RAT enables attackers to send commands through a remote shell, modify the registry, and download additional files. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Scr.Malcode!gen
No-Justice Wiper employed to target Albanian Parliament Iranian threat actors targeted the Albanian Parliament employing the No-Justice Wiper. The attackers utilized commonly used tools such as Putty Link, Revsocks, and the Windows 2000 resource kit in reconnaissance, lateral movement, and the targeting of a telecommunications service provider. The No-Justice Wiper executes multiple actions, including loading a library, receiving addresses for API functions, and ultimately wiping computer disks. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen6 File-based PUA.Gen.2 PUA.Gen.4 Trojan Horse WS.Malware.2 WS.SecurityRisk.3
NoaBot - new Mirai-based botnet The year 2023 marked a significant recovery for crypto markets, rebounding from the 2022 downturn, although it has yet to reach the highs of 2021. As per reports the total crypto market cap surged from below $1 trillion in mid-2022 to surpass $1.5 trillion by December 2023. Threat actors, adapting to new trends in cryptojacking, have shifted their focus to Internet-facing Linux systems and Internet of Things (IoT) devices. A new Mirai-based botnet has been reported as part of a crypto mining campaign. This botnet, equipped with capabilities such as a wormable self-spreader and an SSH key backdoor, can download and execute additional binaries or spread to new victims. As part of the attack, a modified version of the XMRig miner is deployed. Symantec protects you from this threat, identified by the following: File-based Linux.Mirai OSX.Trojan.Gen PUA.Gen.2 Trojan Horse Trojan.Gen.MBT WS.Malware.1 WS.SecurityRisk.3 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Nobelium (aka Hagensia) spear-phishing campaign APT actors known as Nobelium (aka Hagensia) who were behind the infamous SolarWinds attack continue to be active. Recently, one of their email campaigns has been put under the spotlight. The group has been spear-phishing for victims among multiple organizations, with malicious emails purporting to be from the United States Agency for International Development. Multiple threats have been used in these attacks including the following: EnvyScout, a malicious HTML/JS file attachment. NativeZone, a custom Cobalt Beacon loader. BoomBox, a downloader. VaporRage, a shellcode loader. Symantec protects you from these threats, identified by the following: File-based Backdoor.Cobalt Heur.AdvML.C Trojan.Gen.2 Trojan.Gen.NPE Trojan Horse WS.Malware.1 WS.Malware.2 Network-based System Infected: Trojan.Backdoor Domains 2 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Noberus aka ALPHV/BlackCat - a new Rust-based ransomware A new ransomware written in Rust was spotted by Symantec researchers on a victim network in mid-November, with three variants of the ransomware deployed in the course of that attack. In the observed campaign shortly before Noberus ransomware (also known as ALPHV or BlackCat) has been deployed, ConnectWise was also executed. This might be an indication that the attackers may have leveraged access to ConnectWise to deploy their payload. While it is a legitimate tool, ConnectWise has frequently been exploited by ransomware attackers in recent times to gain access to victim networks. Read more in our blog: Noberus: Technical Analysis Shows Sophistication of New Rust-based Ransomware Symantec protects you from this threat, identified by the following: File-based Ransom.Noberus Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE Behavior-based SONAR.SuspLaunch!gen4 Machine Learning-based Heur.AdvML.C Heur.AdvML.M Network-based Attack: Ransom.Gen Activity 51
Noberus ransomware continues attacks with new TTPs Noberus (aka BlackCat, ALPHV) is widely believed to be a successor payload to the Darkside and BlackMatter ransomware families. Attackers deploying the Noberus ransomware have been using new tactics, tools, and procedures (TTPs) in recent months, making the threat more dangerous than ever. Among some of the more notable developments has been the use of a new version of the Exmatter data exfiltration tool, and the use of Eamfo, information-stealing malware that is designed to steal credentials stored by Veeam backup software. Read more in our blog: Noberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen6 File-based Infostealer.Eamfo Ransom.Noberus Trojan.Exmatter Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C
NoBit Ransomware There is no shortage of ransomware threats in the landscape, and on a daily basis both small and large actors are observed. Symantec recently detected a ransomware known as NoBit targeting individual machines of both consumers and enterprises. They accomplish this by disguising their ransomware (a Chaos variant) as a fake Microsoft Edge installer. According to the content of the ransom note, they do not appear to employ double-extortion tactics and instead request a $500 USD ransom while advising the victim to contact them on Telegram. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Heur.Dropper SONAR.SuspBeh!gen625 Machine Learning-based Heur.AdvML.B
No Christmas Break for Agent Tesla: Riyad Bank Impersonated in a Malspam Campaign Usually over Christmas there is somewhat less malware activity, but that does not mean there isn't any. Attacks from all fronts (e.g., email, drive downloads, vulnerabilities, etc.) keep on going. In a recent example, an Agent Tesla malspam campaign caught Symantec's attention, with the actor impersonating Riyad Bank – a major financial institution in Saudi Arabia and one of the largest banks in the country by assets. The malicious emails (subject: Riyad Bank Trade Finance Transaction Notification - REF2023122047047) have been sent to both local (Saudi Arabia) and international organizations (with local ties or not). Attached is a 7z archive (Payment_Advice.JPEG.7z) and within the Agent Tesla binary posing as a Payment document (Payment_Advice.exe). This threat is a Remote Access Trojan (RAT) and information stealer that has been around for some years now and is still highly prevalent. It's being used by multiple groups and individuals around the world. It has been used to conduct financial and identity theft, as well as data breaches—exfiltration of sensitive company information or compromise of confidential documents, sometimes leading to extortion. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Machine Learning-based ACM.Ps-Rgasm!g1 ACM.Rgasm-Lnch!g1 File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B
NoCry ransomware still active in the field Security Response is aware of recent reports regarding activities of the NoCry ransomware. NoCry is believed to be a variant of an older Judge ransomware. The malware will encrypt user files and append .cry extension to them. It has been reported that previous versions of publicly available decryptor tools might also work for the latest NoCry variant. As we continue to monitor and enhance our protections against NoCry Ransomware variants, we recommend performing regular backups for any important data and ensuring your security products are kept up to date with the latest product definitions. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C Trojan.Gen.MBT Trojan Horse Behavior-based SONAR.MalTraffic!gen3
NodeStealer malware campaign leverages social media malvertising for distribution Recently observed NodeStealer campaigns have been leveraging social media malvertising for malware distribution. The attackers have been hijacking Facebook business accounts in order to serve malicious advertisements. Clicking on the ad triggers a download of an archived malicious executable that leads to the infection with the final payload. NodeStealer is an infostealing malware seen for the first time earlier this year. Functionality-wise it can hijack cookie sessions from various web browsers but also steal cryptocurrency wallets, and data from other applications or download additional arbitrary payloads. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.MBT WS.Malware.2 WS.Reputation.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
NodeStealer malware variant 2.0 found in the wild A new 2.0 variant of the NodeStealer malware has been seen distributed via phishing campaigns in the wild. The main functionality of this malware is to steal browser cookies in order to take over Facebook business accounts. The discovered 2.0 NodeStealer variant is written in Python and has additional capabilities which allow for cryptocurrency theft and download of additional arbitrary payloads. BitRAT, HVNC RAT and Xworm are among the payloads seen downloaded by NodeStealer. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.A Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
No diplomatic behavior here, just BackdoorDiplomacy BackdoorDiplomacy is a cyber-espionage group that has been linked to attacks targeting telecommunication companies in Africa and the Middle East, as well as diplomatic entities in the Ministries of Foreign Affairs since 2017. The group is cross-platform targeting both Windows and Linux systems focusing on poorly enforced file-upload security, and exploiting unpatched vulnerabilities found on internet-exposed applications to drop and execute a custom implant called "Turain". This malware will do harvesting and exfiltration of system data overall, which also includes copying sensitive data stored upon removable media. Collected data is then put into a password-protected archive which is passed to a C2 center via the backdoor. Symantec protects you from this threat, identified by the following: File-based Backdoor.Trojan Malware Threat Artifact Trojan.Gen.NPE Trojan.Malscript WS.Malware.1 Network-based URL reputation: Browser navigation to known bad URL Web-based Observed IP/Domains are covered under security categories
NoEscape Ransomware NoEscape ransomware is a Ransomware-as-a-Service offering that was initially observed in the first half of 2023. NoEscape activity has been seen across the globe, primarily focused in North America and Europe. Victims of NoEscape exist across multiple industries, including retail, government, and manufacturing, among others. Attacks leveraging NoEscape exhibit standard ransomware behaviors such as file encryption, process termination, data exfiltration, and threats of extortion through possible data leaks. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.SuspLaunch!g189 SONAR.SuspLaunch!g193 SONAR.TCP!gen1 File-based Downloader Ransom.NoEscape Trojan Horse Trojan.Gen.NPE WS.Malware.1 Machine learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based Attack: Ransom.Gen Activity 46
Nokoyawa ransomware comes now in Rust-based variant New Rust-based variant of the Nokoyawa ransomware has been discovered in the wild. Nokoyawa is a ransomware family first observed back in February 2022 and initially written in C programming language. Similar move to the Rust programming language has been already made by several other ransomware variants and is dictated mostly by faster encryption process and better AV evasion. The threat actors behind Nokoyawa also employ double extortion by ex-filtrating users' data just before the encryption takes place. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.C
NoName057(16) threat group continues their DDoS attacks with help of the DDosia toolkit DDosia is a botnet malware variant known to be leveraged by NoName057(16) threat group in a series of Distributed Denial-of-Service (DDoS) attacks targeting websites of various government agencies, institutions and private companies across Europe in the last few months. NoName057(16) threat actors are known to focus their attacks on Ukraine or countries and organizations supporting Ukraine. DDosia variants come in various versions supporting different operating systems including Windows, Linux and macOS. DDosia malware builds are distributed via a Telegram channel belonging to the threat actors. Last month alone has shown a considerable increase of subscribers to the attacker's channel as well as an increase in number of potential contributors to the DDoS attacks leveraging DDosia toolkit. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT OSX.Trojan.Gen WS.Malware.1 Machine Learning-based Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Nood RAT malware Nood RAT is a Linux variant of the Gh0st RAT malware. The malware functionality includes remote shell execution, infostealing, file management, setup of Socks proxies on the infected systems and port forwarding, among others. Nood RAT might receive additional commands from the attackers C2 servers while the communication with those servers remains encrypted in an attempt to thwart any network detection efforts. Symantec protects you from this threat, identified by the following: File-based Backdoor.Trojan Trojan Horse Trojan.Gen.NPE WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
"No One Was Home" themed Evri phishing emails are making the rounds Evri is a parcel delivery company based in United Kingdom. As the holiday season has started, spoofed emails masqueraded as Evri parcel notifications have been observed. These emails entice the users to click phishing URLs in order to reschedule the delivery as "no one was home". The phishing URLs are constructed using hijacked domains and with a sole purpose of stealing credentials. Subject: Reschedule your parcel Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
NOOSE ransomware Another instance of Chaos ransomware has been observed, where the actors identify themselves as the National Office of Security Enforcement (NOOSE), a fictitious government agency in the real world but existing in the Grand Theft Auto video game. Upon successful compromise and encryption, the ransomware will leave a ransom note (OPEN_ME.txt) instructing victims to pay 1540 USD worth of Monero to a provided crypto wallet. Currently, this actor does not employ double extortion tactics and appears to target single machines through drive-by-download social engineering. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Untrst-RLsass!g1 ACM.Untrst-RunSys!g1 File-based Ransom.Sorry
No plans for Halloween? Emotet would like your company Last minute plans for Halloween? Not if Emotet has its way. Emotet Trojan keeps at it trying to make you open those malicious attachment, as the malware works through the macros in the document. As the latest trend, Symantec has observed a campaign of Emotet spam alluring recipients with invitations to a Halloween party, with the supposed instructions or address in an attached doc file. Email subjects: Halloween Party Halloween Pot Luck 10.31 Halloween invitation Halloween Inviting friends to your Halloween Extravaganza Halloween party invitation Attachment names: Information.doc Halloween party invitation.doc Address and invite list.doc Inviting friends to your Halloween Extravaganza.doc Happy Halloween.doc Details.doc invite list.doc Party tonight.doc Symantec detects the malicious attachments as follows: ISB.Downloader!gen411 Trojan.Gen VBA.Downloader.Gen W97M.Downloader Coverage is also in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Not a Fedex package but Android malware! Smished! Spanish speakers have been the targets of back to back smishing campaigns. Earlier this month, threat actors generated a multitude of fake DHL domains, a technique known as Typo-squatting, to send out SMS messages that include a link to download a malicious Android application. More recently, they are being hit by a new wave of malicious SMS pretending to be Fedex this time, where victims are redirected to download an Android malware (named Fedex.apk). Indicators of compromise: SMS: Tu envio esta por llegar, rastrealo aqui: URL URL format: hxxps://[removed].[Top-Level domain]/fedex/?... Symantec Endpoint Protection Mobile has the following coverage in place: Mobile-based: Android.Reputation.2 Symantec Endpoint Protection Mobile is able to also analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The domains used in this Fedex smishing campaign are known to WebPulse.
Not a "Good Day" ransomware It is not a good day if you are infected with ransomware, however Good Day ransomware is a variant of ARCrypter ransomware that takes its name from that generic greeting on their victims portal. The ransomware has been recently seen distributed as a fake Microsoft Windows Update binary. When successfully launched, it changes the extension of the encrypted files to .crYpX, where X is a capital letter, normally seen starting with A and up to E. Symantec protects you from this threat, identified by the following: File-based Ransom.Gen WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B!200 Heur.AdvML.B!100
Note-taking app's file sharing services abused to share phishing content Legitimate web applications that offer various services are been abused by threat actors to distribute malspam or spread phishing waves. One of the recent phish runs observed by Symantec show that services offered by a popular note-taking service have been abused. These spam runs comprise phishing emails posed as notification messages for recent shared files. As shown in Figure 1, the email content is kept short with the sole purpose to entice the recipient in clicking the blue hyperlinked text. Beneath the text lies a URL directing the recipient to the note-taking app's file sharing webpage. Figure 1: Phishing email masqueraded as notification email with a URL to the note-taking app's file sharing page embedded in content. The twist here is that using a legitimate web application or service, a bogus file is shared with an embedded phishing URL as shown in Figure 2. Figure 2: A bogus .pdf document is shared using the note-taking app’s file sharing service. On clicking the URL provided in the online viewer, the user is redirected to a credential stealing webpage. As shown in Figure 3, these phishing webpages are designed to look and feel like a legitimate file-sharing service login webpages. Figure 3: The embedded URL provided in the online viewer redirects the user to a fake file-sharing service login webpage. Protection Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Notorious Joker again sneaks onto Google Play The Android Malware "Joker" is not new, having been around for some years now. Through these years it has gained a certain notoriety for repeatedly finding its way onto official app stores such as Google Play. Still active and showing no sign of stopping, Joker was recently observed on Google Play yet gain, this time with more than 500K installs. The threat is able to steal device information, SMS messages and contacts. It then attempts to simulate clicks and subscribe victims to premium services. Symantec protects you from this threat, identified by the following: Mobile-based AppRisk:Generisk
NovaSentinel Stealer Symantec continuously monitors the threat landscape for newly advertised threats, and we do encounter many on a daily basis. While some never end up making it, others do thrive over the years. In this protection bulletin, we'll briefly talk about one that was recently spotted along with its test-related activities. Dubbed NovaSentinel, this threat is a run-of-the-mill stealer that is primarily tuned to steal from gamers and crypto-enthusiasts but does also have the capability to damage enterprises. It's currently being sold for 250 Euros per month, or 3,040 Euros for lifetime access. Below are some of its features: Stealing various gaming service sessions (EpicGames, RiotGames, Growtopia, Ubisoft) Taking over Discord accounts Stealing sensitive browser-related information (cookies, history, auto-fill, credit card data, etc.) Stealing crypto wallets Collecting Filezilla, Putty, TotalCommander servers' info Grabbing files Symantec protects you from this threat, identified by the following: File-based Infostealer
Nova Stealer among the malware variants distributed via Facebook ads advertising fake AI services A new infostealer distribution campaign has been reported in the wild with attackers leveraging compromised Facebook accounts to advertise fake AI services impersonating well-known brands such as MidJourney, SORA AI, Evoto, ChatGPT-5 and DALL-E 3. The advertisements lead victims to download malicious software disguised as desktop versions of the mentioned AI programs. Nova Stealer, Rilide Stealer V4, Vidar and IceRAT were among the infostealing payloads distributed in this campaign, which have been known to target users from various European countries. Symantec protects you from this threat, identified by the following: File-based CL.Downloader!gen211 Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE Web.Reputation.1 WS.Malware.1 Machine Learning-based Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
NSABuffMiner worm continues to target servers vulnerable to EternalBlue According to a recently released report, NSABuffMiner botnet (known also as Indexsinas) is still managing to leverage the leaked EternalBlue exploit (CVE-2017-0144) to spread itself across networks using the Server Message Block (SMB) protocol. Upon exploitation a Monero mining module is being dropped on the targeted machines. The attack also leverages two other associated tools (DoublePulsar and EternalRomance) to perform lateral movement and privilege escalation. Symantec protects you from this threat, identified by the following: File-based Backdoor.Doublepulsar Hacktool Heur.AdvML.B Heur.AdvML.C Miner.XMRig Trojan Horse Trojan.Gen.2 Trojan.Gen.NPE Trojan.Gen.MBT Network-based OS Attack: Microsoft Windows SMB RCE CVE-2017-0144 OS Attack: Microsoft Windows SMB Remote Code Execution CVE-2017-0144 OS Attack: Microsoft Windows SMB Remote Code Execution CVE-2017-0144 2 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains are covered under security categories
NuggetPhantom malware distributed via Purple Fox Symantec Security Response is aware of a recent event where NuggetPhantom malware was distributed via a Purple Fox exploit kit. NuggetPhantom is a modular malware toolkit that allows attackers to perform cryptomining, launch DDoS attacks, and download and install remote modules that enable the malware to carry out additional actions. Symantec provides the following protection against this attack: File-based Trojan.Malmsi Network-based 30825 (System Infected: CoinMiner Activity 6) 31298 (System Infected: Malicious PowerShell Script Download 3) 32316 (System Infected: Trojan.Backdoor Activity 473)
NullMixer leveraged for CrashedTech and Koi Loader delivery NullMixer is a dropper variant used to spread payloads belonging to a variety of malware families. The attack chain often involves SEO poisoning, malvertising and social engineering together with the distribution of backdoored or cracked versions of known tools and applications. The most recent NullMixer campaign has been delivering malware loaders from the Koi and CrashedTech families. Once on the compromised endpoints the delivered loaders are used to fetch additional payloads such as Redline Stealer, PseudoManuscrypt or Fabookie Stealer. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based System Infected: Trojan.Backdoor Activity 634 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
NullMixer malware dropper NullMixer is a dropper malware used to spread payloads belonging to a variety of malware families. The attack chain often involves malicious websites distributing all sorts of cracks or software keygen packages that contain the malware dropper installer. NullMixer has been reported to drop payloads belonging to the following malware strains, among others: SmokeLoader, RedLine Stealer, PseudoManuscrypt, FormatLoader, ColdStealer. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based MSIL.Downloader!gen6 Packed.Generic.525 PUA.Gen.2 Scr.Malcode!gdn32 Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE W32.XiaobaMiner WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based System Infected: Trojan.Backdoor Activity 634 Web-based Observed domains/IPs are covered under security categories
NULLTHEGAME Ransomware wants Monero A ransomware actor calling it's malware "NULLTHEGAME" has been observed in the threat landscape running a classic encryption attack with no double-extortion tactics. Upon successful compromise, encrypted files will be appended with a .NULL extension and a ransom note will be left on the machine asking for 30 Moneros, valued at $4,209.63 USD at the time of writing. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspDrop!gen1 File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.C
Numando banking malware Numando is yet another example of banking malware targeting Latin America. The malware is written in Delphi and includes capabilities like displaying fake overlay windows, taking screenshots or killing browser processes. It is reported that the malware is distributed via malspam campaigns containing .msi installers inside of .zip archives. Once the .msi file is executed, the Numando malware will run from the encrypted malware .dll injector. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.C Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains are covered under security categories
NYX ransomware NYX is a ransomware variant written in C/C++ programming language and is partially based on the leaked Conti ransomware source code. NYX is believed to be distributed by the exploitation of exposed Remote Desktop Protocol (RDP) ports over internet. The attackers behind this malware variant employ the double-extortion technique by stealing the user's confidential data before encrypting it. NYX ransomware will append .nyx extension to the encrypted files. Symantec protects you from this threat, identified by the following: File-based Ransom.Conti!gm1 WS.SecurityRisk.4 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200
ObliqueRAT payloads distributed via compromised websites A new report has emerged about a recent malicious campaign spreading the ObliqueRAT trojan. The malware is downloaded with the help of Microsoft Office documents containing malicious macros. The macros point to compromised websites where the ObliqueRAT payloads are hosted in the form of benign image files. Based on some overlaps in C&C infrastructure used by ObliqueRAT and RevengeRAT it is believed that there might be some link between the operators of those two malware families. Symantec provides the following detections related to the reported campaigns: File-based Heur.AdvML.B Heur.AdvML.C ISB.Dropper!gen4 Trojan Horse Trojan.Mdropper Trojan.Reverat W97M.Downloader
OceanLotus fakes it Symantec is aware of a report which describes recent OceanLotus activities via fake websites and social media pages. This cyberespionage is not new and has been around for some years now. They have been targeting private companies with ties to Vietnam in various industries, as well as foreign governments, dissidents, and journalists. Symantec has multiple protection layers in place for these attacks. File-based Trojan.Mebroot!gen6 Heur.AdvML.B WS.Malware.2 WS.SecurityRisk.1 Network-based System Infected: Trojan.Backdoor Domains 2 Website-based This activity is proactively blocked by Symantec Web Isolation technology
OceanMap backdoor attributed to APT28 OceanMap, a backdoor variant based on C# and linked to the APT28 threat group (Fancy Bear), is designed to execute remote commands. It establishes persistence on infected machines by dropping .URL files in the autorun directory. Communication with attackers is facilitated through the IMAP protocol. OceanMap has been observed in recent APT28 campaigns, often in conjunction with Masepie malware, SteelHook PowerShell scripts, and additional tools utilized for network reconnaissance and compromise. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Ps-Http!g2 ACM.Untrst-FlPst!g1 File-based Trojan Horse Trojan.Gen.MBT Web.Reputation.1 WS.Malware.2 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Octo Android malware masquerades as banking mobile app In a recent campaign, Octo Android malware has been observed masquerading as a reputable Greek bank's mobile app. Octo is an Android malware with remote access capabilities targeting financial institutions worldwide, and was first seen in early 2022. The malware's functionality includes blocking push notifications, intercepting SMS messages, disabling sound, locking the device screen, starting remote access sessions and more. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT WS.Malware.1 Mobile-based AppRisk:Generisk Other:Android.Reputation.1
Office and Windows HTML RCE vulnerability (CVE-2023-36884) exploited in targeted attacks A zero-day vulnerability (CVE-2023-36884) affecting Microsoft Windows and Office products is being exploited by attackers in the wild. To date, the exploit has been used in highly targeted attacks against organizations in the government and defense sectors in Europe and North America. The vulnerability was disclosed yesterday (July 11) by Microsoft, which said that an attacker could create a specially crafted Microsoft Office document that enables remote code execution on the target’s computer. In order for the exploit to succeed, the victim needs to open the malicious file. No patch has been released yet for the vulnerability. Read more in our blog: Attackers Exploit Unpatched Windows Zero-Day Vulnerability Symantec has introduced the following protections based on available information. Additional signatures may be added as analysis progresses. Email-based Coverage is in place for Symantec’s email security products File-based Trojan.Mdropper WS.Malware.1 Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
OfflRouter observed infecting Ukrainian DOC files Threat researchers have recently discovered OfflRouter infections in various DOC files observed in the wild. These documents contain VBA code that, once opened, downloads an executable file which begins to look for other DOC files on the machine to infect as well as search for additional plugins on removable drives. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen W97M.Downloader Machine learning-based Heur.AdvML.A Heur.AdvML.A!500 Heur.AdvML.C
OilAlpha targets Arabian Android Users According to a recent report, a new targeted activity against organizations in the Arabian Peninsula has been observed in the wild. The threat actor group dubbed OilAlpha targeted Arabic speaking entities related to the Saudi Arabian government and those interested in political development, humanitarian organizations and NGOs in Yemen. Victims operating Android-based devices were lured into downloading spoofed Android applications injected with remote access trojan like SpyMax and in some cases njRAT. SpyMax is a mobile remote administration tool (RAT) that enables a threat actor to carry out attacks that highly impact the confidentiality and integrity of the victim’s data, as well as the victim’s privacy. It is powerful, widely available, and does not require root privileges on the victim’s device. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Trojan.Gen.MBT Mobile-based AdLibrary:Generisk AppRisk:Generisk Trojan:Spymax Web-based Observed domains/IPs are covered under security categories
Old MS Office vulnerability CVE-2017-11882 still leveraged for Agent Tesla delivery CVE-2017-11882 is an older vulnerability affecting the Equation Editor component in Microsoft Office. Successful exploitation of this flaw might allow attackers for remote code execution on the infected machines. Agent Tesla is a malware family observed to be still leveraging this old vulnerability in some of the recent campaigns. The infection chain initiates from a malspam email with a .xlam attachment containing the CVE-2017-11882 exploit. Once the vulnerability is exploited, the infection continues through further stages involving malicious VBS and JPG files, PowerShell scripts and DLL binaries, leading in the end to the delivery of the final Agent Tesla payload. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Powershell!g85 SONAR.SuspBeh!gen667 SONAR.SuspDataRun SONAR.TCP!gen1 Email-based Coverage is in place for Symantec’s email security products File-based Downloader Exp.CVE-2017-11882!g2 Exp.CVE-2017-11882!g3 Exp.CVE-2017-11882!g5 Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE Trojan.Sorcurat WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Old scams never die, drumroll fake Tech support Tech support scams have been around for years and Symantec continues to observe thousands of malicious traffic redirections to scammer's domains on a daily basis. Our IPS telemetry over the last 30 days for these malicious redirections to Technical support scam sites demonstrates as much. Symantec IPS technology is well suited to block those malicious redirections: Web Attack: Fake Tech Support Domains* Web Attack: Fake Tech Support Website* * This indicates multiple detections exist such as Web Attack: Fake Tech Support Website 295, Web Attack: Fake Tech Support Website 374, etc.
Once again North Korean threat actors target security researchers through social media A recent campaign has come to light where North Korean threat actors are targeting security researchers. The campaign consisted of the publication of a security tool laced with malicious code to extract information from the researcher's system, as well as social engineering through social media. In this second method, the threat actor would build trust over time with the researcher until the point that they would send them malicious files with 0-day exploits or point them to the mentioned "security tool". Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.MBT Machine Learning-based Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
One-click porn fraud for unwary kinksters One-click fraud is a type of social engineering that has been around for nearly a decade now and it's still very much in play throughout the world. In recent months, Japanese have been the target of one of these frauds, where bad actors have been attempting to lure people interested in adult-related video to fake websites purporting to be popular adult video hosting services. The meat of this social engineering scam starts as soon as victims have been successfully lured onto these sites. Fraudsters have crafted a page to trick the victims into thinking they've just signed a contract to a paid service costing around US$4100, or US$3200 if the victim pays within 24 hours (an attempt to get them to pay promptly before they have time to reconsider). Eventually, deceived users end up having to call the listed phone number to either pay for the fictitious service or to cancel it. If they do call the phone number listed, the crooks at the other end will tell them they can't in fact cancel, and try to pressure them into paying the fee. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Network-based URL reputation: Browser navigation to known bad URL Malicious Site: Malicious Domain Request 21 Malicious Site: Malicious Domain Request 22 Malicious Site: Malicious Domain Request 58 Website-based Observed domains are covered under security categories.
One more Ransomware in-the-wild: Phoenix CryptoLocker A Ransomware known as Phoenix Cryptolocker has joined the overcrowded Ransomware threatscape. Upon successful encryption, this threat will append a .phoenix extension to encrypted files. Symantec protects you from this threat, identified by the following: File-based Ransom.Cryptolocker WS.Malware.1
Ongoing campaign targets mobile users with the PhoneSpy malware According to a recent report, an ongoing campaign leveraging a mobile malware dubbed PhoneSpy targets users from South Korea. The malware masquerades itself as various legit applications and is able to steal data and credentials from the compromised devices, install arbitrary APK packages downloaded from the attackers C2 servers, record audio/video from the device and send sms messages. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk AppRisk:Generisk Android.Reputation.2
Ongoing Formbook campaign targets industries in Vietnam and South Korea Formbook is a global threat that affects all countries. Symantec recently detected a Formbook attacker who is targeting industries in Vietnam and South Korea, as well as foreign companies with offices there. Although these countries were the primary targets, there have also been some attempts to infect organizations in other countries like the UK, Singapore, Australia, South Africa, and the US. The attackers typically use emails with malicious archive attachments (GZ for South Korea and ZIP for Vietnam) as the primary means of infecting victims. Through shipping and payment social engineering, the attackers lure victims into opening the attachment and thus executing Formbook. Email subjects 지불을 확인하십시오 Thông tin giao hàng Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based scr.malcode!gdn30 scr.malcode!gdn34
OnionCrypter - encryption service leveraged in various malware campaigns since 2016 According to a recent report, OnionCrypter is a type of packer that has been observed in use by over 30 various malware families since 2016 - this includes the most prevalent ones like Ursnif, Lokibot or Zeus. OnionCrypter is written in C++ and can execute various functions. It is believed that OnionCrypter is one another example of crypter sold in the form of a "Crypter-as-a-Service" offering. Symantec provides the following detection against the related samples packed with OnionCrypter: File-based Heur.AdvML.B Heur.AdvML.C Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse WS.Malware.1
Online-retailers susceptible to Formjacking Formjacking is a term used to describe the use of malicious JavaScript code to steal credit card details and other information from payment forms on the checkout web pages of e-commerce sites. This type of attack is not new and has in fact been around for years, but is still being widely observed in the threat landscape. One of the most notorious gangs behind multiple large Formjacking campaigns is know as Magecart. Last month, we observed a spike which has been attributed to Magecart activity, after which the numbers fell to a steady median as can be seen on the IPS telemetry chart below. We expect more Formjacking activities in the lead up to the year-end holiday period. Symantec constantly monitors Formjacking activities and has the following coverage in place: Network-based Web Attack: Formjacking Website File-based Trojan.Malscript Trojan.Gen.NPE Website-based This attack is proactively blocked by Symantec Web Isolation technology
Online marketplaces (e.g Mercari) get busy at year-end, and so do phishing activities Online marketplaces, such as Mercari (a popular Japanese e-commerce platform that caters both store and individual users), typically experience increased activity around year-end. Many people engage in year-end cleaning, decluttering, and reorganizing, often leading to the sale of items they no longer need. Additionally, the holiday season prompts individuals to buy and sell items for gift-giving purposes or to make extra money for holiday expenses. During this time of the year, Symantec observes an uptick in phishing campaigns. For instance, one actor has been spamming malicious emails from randomly generated email domains to Japanese consumers and enterprise users. The emails, with the subject "【メルカリ】一時的な利用停止、ログインして確認してください," leverage a classic account suspension tactic in an attempt to lure recipients into clicking the malicious URL and redirecting them to a fake Mercari login page. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
OnlyFans' cheaters end up being cheated OnlyFans is a well-known platform on which creators can post their photos and other kinds of content, making various content accessible either for free, via a monthly subscription or pay-per-view. The service also allows fans to one-time tip their favorite creators. During the Covid-19 lockdown there has been an increase in popularity which did not go unnoticed by the watchful eyes of cybercriminals. There are clearly plenty of internauts who would like to get an eyeful of OnlyFans content which is gated behind a paywall, for free, and cybercriminals know it only too well. In recent months, Symantec has observed an increase in social engineering related to this platform. Observed social engineering: Fake OnlyFans account generators to access content for free Fake OnlyFans content downloaders, leakers, and grabbers Fake downloaded OnlyFans content of known creators Fake OnlyFans premium access hacks These fake tools are of course malware in disguise, and baited users may be the ones who'll get watched for free as we've seen multiple remote access trojans (RATs) such as Nanocore and LimeRAT. There were also instances of infostealers (Agent Tesla and Discord stealers) and cryptocurrency miners. These were mostly being distributed via drive-by-download from social media, websites and forums. Symantec protects you from these threats, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C Trojan.Limerat Trojan.Nancrat Trojan.Nancrat!g1 SMG.Heur!gen WS.Malware.1 WS.SecurityRisk.3 WS.SecurityRisk.4 Behavior-based SONAR.SuspBeh!gen92 SONAR.SuspDataRun
Onyx Ransomware Onyx is another Ransomware that's been observed in the wild after a two month hiatus. Actors behind this .NET threat developed it based off Chaos Ransomware and as such it employs double extortion tactics. As of today, it has predominantly targeted companies in the US, and reports assume that there is a probability that Onyx may be run by Conti's affiliates or at least collaborated with them after one of the victims was reported on both Conti's and Onyx's leak websites. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspDrop!gen1 File-based Ransom.Sorry
OpcJacker It has been reported that a new infostealer disguised as a VPN installer is being delivered through malvertising. This latest threat, known as OpcJacker, has typical infostealing features but with a particular emphasis on stealing cryptocurrency wallets through the use of clipping/hijacking tactics. Furthermore, it has the ability to run modules such as NetSupport RAT and hVNC. This campaign is primarily directed towards consumers. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Trojan.Gen.NPE Machine Learning-based Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
Open source SpyBoxRAT and HorusEyesRAT in-the-wild SpyBoxRAT and HorusEyesRAT are two open source Remote Access Tools that have been posted on known software development platforms. They have also been echoed on hacker forums and underground forums. HorusEyesRAT is seen as the evolution of SpyBoxRAT, though both projects have been archived by the author. In recent months, there has been increased HorusEyesRAT activity as it's being used by multiple groups and individuals and mostly distributed via malicious emails and drive-by-download. Symantec protects you from these threats, identified by the following: File-based Heur.AdvML.B Trojan.Gen.MBT WS.Malware.1 WS.Malware.2
Operation Blacksmith The Lazarus APT group is behind the recent Operation Blacksmith campaign, exploiting the 2021 Log4j vulnerability (CVE-2021-44228) known as Log4Shell. Three new malware families - NineRAT, DLRAT, and BottomLoader - coded in the Dlang programming language, are used to deploy payloads in this campaign. BottomLoader delivers additional payloads, while NineRAT and DLRAT execute various commands from the attackers' C2 servers. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Ps-Http!g2 ACM.Ps-Sc!g1 ACM.Untrst-RLsass!g1 ACM.Untrst-RunSys!g1 SONAR.MalTraffic!gen1 SONAR.TCP!gen1 File-based PUA.Gen.2 Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.C Network-based Audit: Log4j2 RCE CVE-2021-44228 Attack: Log4j2 RCE CVE-2021-44228 2 Attack: Log4j2 RCE CVE-2021-44228 3 Attack: Log4j2 RCE CVE-2021-44228 4 Attack: Log4j2 RCE CVE-2021-44228 5 Attack: Log4j2 RCE CVE-2021-44228 7 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Operation Dianxun Symantec Security Response is aware of a public report of Operation Dianxun which targets telecommunications companies for information likely associated with 5G technology. The report suggests that methods used in the campaign are similar to the tactics employed by previously identified threat actors. Symantec provides the following coverage against Operation Dianxun: File-based Trojan.Gen.2 Trojan.Gen.MBT Downloader Web-based Observed domains are covered under security categories
Operation Exorcist There has been a report on multiple spearphishing campaigns (dubbed "Operation Exorcist") against the roman catholic church which happened over the span of several years. In these attacks, actors leveraged PlugX (a known remote access trojan) along with other malware such as NBTScan, Sparkle, NewBounce, ScanLine, Kotibu Gh0st and Zupdax. Symantec protects you from these threats, identified by the following: File-based Backdoor.Trojan Hacktool.Rootkit Packed.Cupx!gen2 Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse Machine Learning-based Heur.AdvML.B Heur.AdvML.C
Operation HamsaUpdate Operation HamsaUpdate is a recently identified campaign targeting Israeli customers using F5’s network devices. The attackers have been reported to leverage wiper malware targeting Windows servers (variant called Hatef) as well as Linux platform (variant called Hamsa). The attack chain initiates through phishing emails containing .zip archives with a .NET application disguised as a F5 update tool. The deployed loader has the functionality to execute the wiper malware payloads. During the wipe operation the malware continuously communicates with attackers via Telegram, providing updates on the status of the infected machines as well as progress of the running wiping tasks. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Ps-Wscr!g1 ACM.Untrst-RunSys!g1 AGR.Terminate!g2 SONAR.MalTraffic!gen1 SONAR.SuspLaunch!g220 SONAR.SuspLaunch!g221 SONAR.SuspPE!gen32 SONAR.SuspStart!gen18 SONAR.TCP!gen1 File-based Downloader Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!500 Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Operation Spalax targets Colombian companies Symantec is aware of the Operation Spalax targeting Colombian institutions and companies. These attacks consist of phishing e-mails containing social engineering techniques. The e-mail contents appear to be intimidating recipients with court hearings, bank account freeze warnings, or notifications about the mandatory COVID-19 test. These e-mails have a PDF file as an attachment. The PDF attachments have a link to RAR archives hosted on legitimate cloud hosting platforms. Once those archives are unpacked, they contain malicious files capable of remotely controlling the victim's machine. This campaign is known to use three commercially available remote access Trojans (RATs) - Remcos, njRAT, and AsyncRAT. Symantec provides the following coverage against this campaign: File-based Backdoor.Ratejay Heur.AdvML.C Infostealer Packed.Generic.548 Packed.Generic.570 Packed.NSISPacker!g6 Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse
OrBit - a new Linux malware OrBit is a newly discovered Linux malware variant that utilizes advanced evasions techniques. OrBit can provide the attackers with remote access to the compromised hosts but can also be used to harvest user's credentials. The malware is capable of infecting all running processes and gaining persistence on the victim's machine. OrBit comes in form of a dropper that initially prepares the machine for malware execution and a payload binary that is installed afterwards. Symantec protects you from this threat, identified by the following: File-based Trojan Horse WS.Malware.2
Orchard Botnet A new botnet dubbed Orchard was observed using Bitcoin creator Satoshi Nakamoto's information to generate malicious domains in order to conceal its command-and-control (C2) infrastructure. The botnet has undergone at least three revisions since February 2021, its main purpose being to deploy additional payloads onto a victim's machine and execute commands received from the C2 server. Additional capabilities of the botnet include uploading device and user information as well as infecting USB storage devices to aid in propagating the malware. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B Heur.AdvML.C Web-based Observed IPs/domains are covered under security categories
Orcus RAT remains active in the wild The Orcus Remote Access Trojan (RAT) was initially discovered back in 2016 and it still continues to be found in various in the wild distribution campaigns. The malware has typical RAT functionalities including remote administration, keylogging, credential theft, remote code execution and few others. Orcus is known to be spread via spear-phishing or drive-by-downloads. Due to its' modular architecture the malware can be enhanced via custom-built or downloaded plugins. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.SuspBeh!gen57 SONAR.SuspBeh!gen609 SONAR.SuspBeh!gen625 SONAR.TCP!gen1 SONAR.UACBypass!gen9 File-based Scr.Malcode!gdn14 Scr.Malcode!gdn32 SMG.Heur!gen Trojan Horse Trojan.Gen.MBT Trojan.Sorcurat WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based System Infected: Trojan.Backdoor Activity 634
OriginLogger malware spread in a recent malspam campaign OriginLogger malware has been recently distributed in a malspam campaign leveraging malicious .iso attachment files disguised as payment invoices. The delivered emails with the subject "BANK PAYMENT NOTIFICATION" purported to come from a banking institution. Upon running the executable contained within the .iso file, a loader malware begins the infection process and delivers the malicious payload to the victim's machine. OriginLogger malware is an infostealer and keylogger that shares many similarities with the AgentTesla malware. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Trojan.Gen.2 Trojan.Gen.NPE WS.Malware.2 Machine Learning-based Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
Orion Grabber Symantec has recently observed drive-by-download activity in which an actor was trying to lure victims with cracked software and hacks. Unbeknownst to the victims, they actually download and execute an infostealer known as Orion (also known as Orion Grabber). While authors advertise this malware as the number 1 grabber, it's pretty much a run-of-the-mill infostealer. Below are some of its stealing capabilities: Web browser sensitive data (history, cookies, passwords) Computer information Desktop screenshots Webcam pictures Crypto wallet clipper According to the authors, there are more than 40 plugins available and Orion reports back to the operator using Discord's webhooks. Symantec protects you from this threat, identified by the following File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B
OSAMiner - Mac cryptominer returns with new evasion tricks There have been reports about the return of the Monero coin mining malware which was infamous in 2015, know as OSAMiner. In recent variants, attackers have made an attempt to make the analysis and detection of the malware more challenging by using Run-Only AppleScript in the malware. OSAMiner targets MacOS and is known to spread via cracked software and games. Symantec provides the following coverage against this coinmining malware: File-based OSX.Malcol.2 OSX.Trojan.Gen OSX.Trojan.Gen.2 WS.Malware.1 Network-based [30765] System Infected: Miner.Bitcoinminer Activity 7
Oscorp, Android stealer There have been reports of a new Android stealer in-the-wild. Dubbed Oscorp, it's been observed being distributed via a domain. If the victim is successfully tricked into installing this app and granting it permissions, the malware will be able to perform the following actions: Steal credentials Record video and audio Uninstall applications Manage calls and sms Steal cryptocurrency payment via redirection Steal Google 2FA PIN Symantec has the following coverage in place: Mobile-based AppRisk:Generisk
Osiris, banking malware Recently, there have been reports of Osiris (Kronos variant) activity which targeted German manufacturing industries and their customers. Symantec has the following coverage in place: File-based Heur.AdvML.B WS.Malware.1
Oski poses as Avast installer Oski stealer continues to be observed in the threat landscape. Used by multiple groups and individuals, this run-of-the-mill infostealer is primarily distributed via drive-by-download but also seen in malspam campaigns. The malware is still maintained by its authors and we regularly see new versions. Recently, Symantec observed a drive-by-download campaign in which malicious Oski were disguised as an Avast installer. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Network-based System Infected: Vidar Malware Activity 2 Machine learning-based Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
Oski Stealer delivered in a recent malspam campaign A recent malspam campaign observed in July has been leveraging Agent Tesla malware to deliver an infostealing payload. Dubbed as Oski Stealer, the malware is known since 2019 and focuses on stealing sensitive information from web browsers, user credentials and cryptocurrency wallets, among others. The distribution of the Oski malware in this campaign relied on malicious emails with macro-laden Microsoft PPT files attached to them. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Trojan Horse Trojan.Gen.MBT WS.Malware.1 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Oski Stealer drive-by-download activity observed Oski Stealer is an infostealer that was first observed being marketed on underground forums in late 2019 and early 2020. The malware focuses on stealing sensitive information from web browsers and cryptocurrency wallets. It has undergone some development since it was first advertised on underground forums, which shows that the authors are keen on improving their malware features and capabilities. So far, Oski Stealer's prevalence is not quite at the level of more infamous infostealers like Agent Tesla, AzorUlt, Formbook and Lokitbot but that may not be the case for long. Clearly, the malware is being used by various individuals and groups and its prevalence will likely increase. Below is a screenshot of an Oski Stealer login panel. Symantec Security Response has been monitoring its activities for some time now, and during the past two months we observed new domains associated with the malware, with recently collected samples mostly being distributed via drive-by-download. This vector is not the only one that criminals who bought Oski Stealer have been seen employing this year. It's also been distributed in spam, some themed around Covid-19. Symantec has the following protections in place for the recent Oski Stealer samples. File-based protection SMG.Heur!gen ML.Attribute.HighConfidence Trojan.Gen.9 Trojan Horse WS.Malware.2 WS.Malware.1 Heur.AdvML.B Heur.AdvML.C Network-based protection Web Attack: Suspicious Executable Image Download(22819) System Infected: Vidar Malware Activity 2(32043)
OSX Xcsset spyware activity continues Xcsset Spyware was first seen in mid 2020, and since then we continue to observe instances in-the-wild. This spyware is known to spread via infected Xcode projects but may also be able to spread via trojanized apps. Any MacOS user, developer or otherwise, could potentially be a victim. Symantec has the following coverage in place for this threat: File-based OSX.Trojan.Gen OSX.Trojan.Gen.2 WS.Malware.1
Ousaban (aka Javali) continues to lurk in Brazil Ousaban (also known as Javali) is one of the many banking malware being observed in Latin America, with a predominance in Brazil. In recent activities, actors continue to use malspam as a main vector along with run-of-the-mill social engineering to distribute the threat. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Ov3r-stealer malware Recently discovered, Ov3r_Stealer, a password-stealing malware, is spreading via fraudulent job postings on Facebook, typically promoting managerial roles. Victims are directed to a Discord link where a PowerShell script fetches the malware payload from a GitHub repository. Ov3r_Stealer is crafted to pilfer data from various applications such as cryptocurrency wallets, web browsers, browser extensions, Discord, FileZilla, among others. Furthermore, it scrutinizes the system services configuration in the Windows Registry, potentially to pinpoint additional targets. Symantec protects you from this threat, identified by the following: File-based ISB.Heuristic!gen39 ISB.Heuristic!gen43 Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE Web.Reputation.1 WS.Malware.2 Machine Learning-based Heur.AdvML.A Heur.AdvML.A!300 Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products