DarkGate and PikaBot Trojans picked up the baton of the QakBot that left the race

Teacher

Professional
Messages
2,673
Reputation
9
Reaction score
690
Points
113
The DarkGate and PikaBot malware programs are distributed by cybercriminals using the same methods as the attacks using the QakBot Trojan, which was eliminated in August. This was announced by Cofense in its report.

The QakBot platform (QBot, Pinkslipbot), was eliminated during a joint law enforcement operation codenamed Duck Hunt in August of this year. Qakbot infected more than 700,000 victims computers, contributed to the spread of ransomware viruses, and caused hundreds of millions of dollars in damage to businesses, healthcare facilities, and government agencies around the world.

DarkGate and PikaBot are capable of delivering additional loads to infected hosts, which makes them attractive to attackers. The similarity between PikaBot and QakBot was noted by analysts based on the same distribution methods, campaign, and malware behavior.

The DarkGate malware supports a wide range of malicious actions, including installing an hVNC connection for remote access, cryptocurrency mining, Reverse Shell configuration, keylogging, clipboard hijacking, and stealing information (files, browser data).

The Cofense report notes that the connection is bidirectional, meaning attackers can send commands and receive responses in real-time, allowing them to navigate through the victim's system, siphon data, or perform other malicious actions.

Analysis of the Cofense phishing campaign showed that it is aimed at a wide range of sectors, and the attack chains include a malicious URL in phishing emails leading to a ZIP archive. The ZIP archive contains a JavaScript loader, which in turn accesses the second URL to download and run the DarkGate or PikaBot malware. It is noteworthy that in one case, the attack used Excel add-in files (XLL) instead of JavaScript loaders to deliver final loads.

2e7104eff8.png


Successful infection of DarkGate or PikaBot can lead to the delivery of software to steal cryptocurrency, install tracking tools, ransomware, or any other malicious file that attackers want to install on the victim's machine.

The DarkGate malware supports a wide range of malicious activities from remote access to data theft. In June, security researchers discovered a new MalSpam phishing campaign that infected victims devices with DarkGate.According to Telekom Security experts, the sudden surge in DarkGate activity may be due to the fact that the malware developer began renting it out to a limited circle of affiliates. Prices for a DarkGate subscription start at $1,000 per day and go up to $100,000 per year.

Earlier, Kaspersky Lab revealed a global campaign to distribute the PikaBot malware among corporate users. The attack began in mid-May and peaked between the 15th and 18th. During this period, about 5 thousand such emails were found. PikaBot is a new malware family that shares similarities with the well-known banking Trojan Qbot. PikaBot can install other malware on infected devices or execute remote commands.

• Source: https://cofense.com/blog/are-darkgate-and-pikabot-the-new-qakbot/
 

Teacher

Professional
Messages
2,673
Reputation
9
Reaction score
690
Points
113
In mid-January, security researchers noticed a new large-scale campaign to distribute malicious software DarkGate, exploiting a recently fixed vulnerability in the Microsoft Windows security system, and even before it was fixed, that is, in the Zero-day format.

According to Trend Micro, the attacks began with the use of PDF files containing open Google DoubleClick redirects that led victims to compromised sites. These sites exploited the CVE-2024-21412 vulnerability, which allows them to bypass Windows SmartScreen protection and install malicious installers that mimic popular iTunes, Notion, and NVIDIA applications distributed in the "msi" format.

Vulnerability CVE-2024-21412, which has a CVSS score of 8.1, allows unauthorized attackers to bypass SmartScreen protection by using a specially created malicious file.

As noted above, Microsoft fixed this vulnerability as part of the February Patch Tuesday update package, but until then it was used not only to distribute DarkGate, but also to deliver the DarkMe malware used by the Water Hydra group. These attacks targeted financial institutions.

As for DarkGate, in this operation, hackers used CVE-2024-21412 in combination with redirects from Google Ads to spread malware. Victims click on a link from an attached PDF file obtained through a phishing email, which leads to downloading a malicious file that exploits the above vulnerability.

In addition to CVE-2024-21412, experts also recorded the use of another Windows SmartScreen vulnerability for delivering DarkGate-CVE-2023-36025 with a score of 8.8 on the CVSS scale, which was successfully exploited by hackers from TA544 back in November last year.

Security researchers emphasize the importance of vigilance and the need to avoid installing software from untrusted sources. This applies to both fake installers and the abuse of Google Ads technologies that allow attackers to scale their attacks.

In addition, experts note an increase in the number of new malware families capable of stealing confidential information, as well as an increase in the use of popular platforms for distributing malware, often with elements of social engineering.

The researchers findings highlight the complexity of ensuring the security of modern cyberspace and the need for an integrated approach to digital protection for both organizations and individual users.
 
Top