Premium Only Content
Sophisticated BundleBot Malware Disguised as Google AI Chatbot and Utilities - The Hacker News
🥇 Bonuses, Promotions, and the Best Online Casino Reviews you can trust: https://bit.ly/BigFunCasinoGame
Sophisticated BundleBot Malware Disguised as Google AI Chatbot and Utilities - The Hacker News
Jul 21, 2023 THN Cyber Threat / Malware A new malware strain known as BundleBot has been stealthily operating under the radar by taking advantage of .NET single-file deployment techniques, enabling threat actors to capture sensitive information from compromised hosts.
"BundleBot is abusing the dotnet bundle (single-file), self-contained format that results in very low or no static detection at all," Check Point said in a report published this week, adding it is "commonly distributed via Facebook Ads and compromised accounts leading to websites masquerading as regular program utilities, AI tools, and games."
Some of these websites aim to mimic Google Bard, the company's conversational generative artificial intelligence chatbot, enticing victims into downloading a bogus RAR archive ("Google_AI.rar") hosted on legitimate cloud storage services such as Dropbox.
The archive file, when unpacked, contains an executable file ("GoogleAI.exe"), which is the .NET single-file, self-contained application ("GoogleAI.exe") that, in turn, incorporates a DLL file ("GoogleAI.dll"), whose responsibility is to fetch a password-protected ZIP archive from Google Drive.
The extracted content of the ZIP file ("ADSNEW-1.0.0.3.zip") is another .NET single-file, self-contained application ("RiotClientServices.exe") that incorporates the BundleBot payload ("RiotClientServices.dll") and a command-and-control (C2) packet data serializer ("LirarySharing.dll"). "The assembly RiotClientServices.dll is a custom, new stealer/bot that uses the library LirarySharing.dll to process and serialize the packet data that are being sent to C2 as a part of the bot communication," the Israeli cybersecurity company said.
The binary artifacts employ custom-made obfuscation and junk code in a bid to resist analysis, and come with capabilities to siphon data from web browsers, capture screenshots, grab Discord tokens, information from Telegram, and Facebook account details.
Check Point said it also detected a second BundleBot sample that's virtually identical in all aspects barring the use of HTTPS to exfiltrate the information to a remote server in the form of a ZIP archive.
"The delivering method via Facebook Ads and compromised accounts is something that has been abused by threat actors for a while, still combining it with one of the capabilities of the revealed malware (to steal a victim's Facebook account information) could serve as a tricky self-feeding routine," the company noted. The development comes as Malwarebytes uncovered a new campaign that employs sponsored posts and compromised verified accounts that impersonate Facebook Ads Manager to entice users into downloading rogue Google Chrome extensions that are designed to steal Facebook login information.
Users who click on the embedded link are prompted to download a RAR archive file containing an MSI installer file that, for its part, launches a batch script to spawn a new Google Chrome window with the malicious extension loaded using the "--load-extension" flag - start chrome.exe --load-extension="%~dp0/nmmhkkegccagdldgiimedpiccmgmiedagg4" "https://www.facebook.com/business/tools/ads-manager" UPCOMING WEBINAR Shield Against Insider Threats: Master SaaS Security Posture Management Worried about insider threats? We've got you covered! Join this webinar to explore practical strategies and the secrets of proactive security with SaaS Security Posture Management. Join Today "That custom extension is cleverly disguised as Google Translate and is considered 'Unpacked' because it was loaded from the local computer, rather than the Chrome Web Store," Jérôme Segura, director of threat intelligence at Malwarebytes, explained, noting it is "entirely focused on Facebook and grabbing important pieces of information that could allow an attacker to log into accounts."
The captured data is subsequently sent using the Google Analytics API to get around content security policies (CSPs) to mitigate cross-site scripting (XSS) and data injection attacks.
The threat actors behind the activity are suspected to be of Vietnamese origin, who have, in recent months, exhibited acute interest in targeting Facebook business and advertising accounts. Over 800 victims worldwide have been impacted, with 310 of those located in the...
-
7:51:03
GuardianRUBY
8 hours agoRumble Takeover! The Rumblings are strong
61.8K2 -
4:28:45
Etheraeon
15 hours agoWorld of Warcraft: Classic | Fresh Level 1 Druid | 500 Follower Goal
45.5K -
3:17:21
VapinGamers
7 hours ago $3.60 earned🎮🔥Scrollin’ and Trollin’: ESO Adventures Unleashed!
31.2K2 -
LIVE
a12cat34dog
8 hours agoGETTING AFTERMATH COMPLETED :: Call of Duty: Black Ops 6 :: ZOMBIES CAMO GRIND w/Bubba {18+}
385 watching -
8:23:18
NubesALot
11 hours ago $5.12 earnedDark Souls Remastered and party games
27.9K -
3:03:42
GamersErr0r
22 hours ago $2.14 earnedits not what you think
22.9K1 -
7:15:50
Phyxicx
8 hours agoRocket League with Friends! - 11/22/2024
17.1K1 -
7:54:29
STARM1X16
9 hours agoFriday Night Fortnite
14.3K -
29:51
Afshin Rattansi's Going Underground
1 day agoJimmy Dore on Ukraine & WW3: Biden Wants a War that Trump CAN’T Stop, ONLY Hope is Putin’s Restraint
72.2K32 -
3:20:54
Fresh and Fit
11 hours agoExposing WHO Killed JFK w/ Cory Hughes & Tommy Sotomayor
93.2K54