Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

0

Hackers Disguising Winos 4.0 Malware as Gaming Tools: AWarning from Fortinet

Cybersecurity firm Fortinet has issued a warning about ahacking group known as Void Arachne, which is distributing Winos 4.0 malware disguised as gaming tools. The group is targeting unsuspecting users by offering free downloads ofsoftware purportedly designed to enhance gaming experiences, such as game installers and system optimization tools.

The malicious software operates through a cunning multi-step process. Once downloaded and opened, the software triggers a series of events that ultimately lead to the deployment of the Winos 4.0 malware. The process begins with the download of seemingly harmless BMP image files from a server controlled by the hackers.These images are then decoded using the XOR algorithm, revealing a malicious DLL file named you.dll.

This DLL file then proceeds to create an environment conducive to the malware’s installation, downloading three additional files disguised as BMP imagesand saving them as TMP files. These TMP files are then used to extract the malicious libcef.dll file, which establishes a C2 connection with the hacker’s server and deploys the Winos 4.0 malware.

Once installed, the malware grants hackers remote access to the victim’sdevice, allowing them to execute code remotely and even monitor the user’s clipboard and desktop. This level of access grants the hackers the ability to steal sensitive information, control the device, and potentially cause significant damage.

Fortinet urges users to exercise caution when downloading software from unofficial sources. Stick to reputable websites andofficial channels to minimize the risk of encountering malicious software.

This incident highlights the growing sophistication of cyberattacks and the importance of maintaining a strong cybersecurity posture. Users should be aware of the potential dangers lurking within seemingly innocuous software downloads and take proactive measures to protect themselves.

References:

  • FortinetReport: [Insert link to Fortinet report]
  • IT之家: [Insert link to IT之家 article]


>>> Read more <<<

Views: 0

0

发表回复

您的邮箱地址不会被公开。 必填项已用 * 标注