May 25, 2020 By David Bisson 3 min read

Last week in security news, researchers observed digital criminals selling a new malware strain based on the ZeuS family called “Silent Night.” This Trojan wasn’t the only new threat that made headlines last week. Security analysts also uncovered a new strain based on a leak of the DenDroid malware family along with a new backdoor employed by the Winnti Group.

Top Story of the Week: Introducing Silent Night

In May 2020, Malwarebytes observed a new malware strain whose design was reminiscent of the ZeuS banking Trojan family. Researchers also noticed that malware authors had compiled version 1.0 of the threat in November 2019, which indicated that the threat was new.

The security firm investigated the malware and found it being offered for sale on underground web forums. Named “Silent Night,” the threat arrived as a downloader that fetched its core malicious module and injected it into numerous running processes. This infection chain made use of legitimate components to achieve its nefarious ends.

Source: iStock

Also in Security News

  • Reflective DLL Loading Employed by Attackers to Deploy Netwalker: Trend Micro observed malicious actors using a technique known as reflective dynamic-link library (DLL) loading to deploy samples of Netwalker ransomware. These attacks began with a PowerShell script and allowed malicious actors to load a DLL from memory instead of from a disk.
  • E-Skimming Attacks Enabled by Magento Plugin Vulnerability: The FBI warned in an alert that it had witnessed malicious actors abusing a cross-site scripting bug in the Magento Mass Import plugin. This exploit granted digital attackers the ability to conduct e-skimming attacks without raising any red flags.
  • New “WolfRAT” Malware Linked to DenDroid Family: Cisco Talos discovered that the Android-based “WolfRAT” threat shared command-and-control (C&C) infrastructure with the DenDroid malware family. Researchers also observed some links with Wolf Research, an organization known for developing espionage-based software.
  • Multiple Phishing Campaigns Spoof New Azure AD Sign-In Page: In mid-May, Microsoft Security Intelligence detected numerous phishing operations that spoofed the new Azure AD sign-in page. One of those campaigns leveraged a PDF document disguised as a OneDrive document to redirect victims to a phishing website disguised as Microsoft’s sign-in page.
  • Source Code for GhostDNS Exploit Kit Leaked Online: Avast’s Web Shield analyzed a .RAR archive and found that it contained the complete source code of the GhostDNS exploit kit. In effect, this linked file contained everything that an attacker needs to conduct a DNS hijack campaign and steal sensitive information inputted by victims.
  • Android Devices Carefully Targeted by Mandrake Espionage Platform: In early 2020, Bitdefender came across the Mandrake platform while it was engaged in conducting phishing attacks against cryptocurrency wallets and other targets. Closer analysis revealed that Mandrake selected just a handful of Android devices for exploitation so as to avoid detection.
  • New PipeMon Backdoor Employed by Winnti Group: In early February, ESET observed the Winnti Group employing a new modular backdoor called “PipeMon” to target video game developers located in Asia. In one of those attacks, the threat group used the backdoor to compromise its target’s build system; in another, it infected a company’s game servers.

Security Tip of the Week: Strengthen Your Anti-Malware Defenses

Security professionals can strengthen organizational anti-malware defenses by investing in solutions that leverage artificial intelligence (AI) to spot sophisticated threat behaviors indicative of malicious software. Companies should also make sure they have an incident response (IR) plan in place for the purpose of addressing a malware infection.

More from

Debate rages over DMCA Section 1201 exemption for generative AI

2 min read - The Digital Millennium Copyright Act (DMCA) is a federal law that protects copyright holders from online theft. The DMCA covers music, movies, text and anything else under copyright.The DMCA also makes it illegal to hack technologies that copyright owners use to protect their works against infringement. These technologies can include encryption, password protection or other measures. These provisions are commonly referred to as the “Anti-Circumvention” provisions or “Section 1201”.Now, a fierce debate is brewing over whether to allow independent hackers…

CISA Malware Next-Gen Analysis now available to public sector

2 min read - One of the main goals of the Cybersecurity and Infrastructure Security Agency (CISA) is to promote security collaboration across the public and private sectors. CISA firmly believes that partnerships and effective coordination are essential to maintaining critical infrastructure security and cyber resilience.In faithfulness to this mission, CISA is now offering the Malware Next-Generation Analysis program to businesses and other organizations. This service has been available to government and military workers since November 2023 but is now available to the private…

Social engineering in the era of generative AI: Predictions for 2024

5 min read - Breakthroughs in large language models (LLMs) are driving an arms race between cybersecurity and social engineering scammers. Here’s how it’s set to play out in 2024.For businesses, generative AI is both a curse and an opportunity. As enterprises race to adopt the technology, they also take on a whole new layer of cyber risk. The constant fear of missing out isn’t helping either. But it’s not just AI models themselves that cyber criminals are targeting. In a time when fakery…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today