"Invisible" Password-Stealing Malware Uncovered: A New Cyber Threat Emerges

18th August 2024

"Invisible" Password-Stealing Malware Uncovered: A New Cyber Threat Emerges

Share:

Discover how sophisticated, stealthy malware is stealing passwords, credit card details, and sensitive data from your browser. Learn more about this emerging cyber threat.

Introduction: In a startling development, cybersecurity analysts at Barracuda Networks have uncovered a new, highly sophisticated strain of malware designed to steal a wide array of sensitive information. Dubbed "invisible" due to its ability to operate undetected, this malware targets everything from saved passwords and credit card information to Bitcoin-related browser extensions. The discovery highlights the ever-evolving tactics of cybercriminals and underscores the need for enhanced vigilance in online security practices.

The Discovery of a Stealthy Cyber Threat


The malware, uncovered by Barracuda Networks, represents a new level of sophistication in phishing attacks. Unlike traditional malware, which often leaves traces that can be detected by cybersecurity tools, this "invisible" malware is designed to operate under the radar. It meticulously harvests sensitive data, including passwords, session files, credit card details, and browsing history, before sending this information to a predetermined email address.

The attack begins with a phishing email, a common tactic in the cybercriminal's arsenal. These emails, riddled with grammatical errors and sent from fake addresses, urge recipients to open an attachment purportedly related to a purchase. The attachment contains an ISO file—a digital replica of data from optical discs like CDs or DVDs.

How the Malware Operates


Once the ISO file is opened, an HTML Application (HTA) file within it is activated. Unlike standard web applications, HTA files bypass the security restrictions typically enforced by web browsers, allowing the malware to execute commands on the victim’s computer.

The first step in the malware’s operation involves downloading and running a JavaScript file from a remote server. This script then executes a PowerShell command to download a ZIP file containing the malicious software. The malware, now active, briefly collects data from the infected system before erasing all traces of its existence, including the malware itself, making detection exceedingly difficult.

Targets and Tactics: What the Malware Steals


The malware is specifically designed to extract a range of sensitive information from popular web browsers, including Chrome, Edge, Yandex, and Brave. It captures MasterKeys, session files, saved passwords, credit card information, and detailed browsing history. Additionally, the malware targets Bitcoin-related browser extensions, such as MetaMask and Coinbase Wallet, copying data crucial to cryptocurrency transactions.

Beyond browser data, the malware extends its reach to steal PDF files and lock entire folders, including those commonly used by users, such as the desktop, Downloads, Documents, and certain %AppData% folders. This comprehensive data collection is then meticulously organized and sent to specific email addresses associated with the maternamedical.top domain. Each address is designated to receive specific types of stolen data, from cookies and PDFs to browser add-ons.

The Growing Threat of Advanced Phishing Attacks


The discovery of this "invisible" malware by Barracuda Networks serves as a stark reminder of the growing sophistication of phishing attacks. Cybercriminals are continually refining their tactics, creating malware that not only steals sensitive information but also evades detection. As this new threat demonstrates, the traditional safeguards may no longer be sufficient to protect against such advanced attacks.

Protecting Yourself from Emerging Cyber Threats


In light of this discovery, cybersecurity experts are urging individuals and organizations to strengthen their defenses against phishing attacks. This includes being cautious about opening email attachments, even from seemingly legitimate sources, and ensuring that all software, particularly antivirus programs, is kept up to date.

The emergence of this "invisible" malware underscores the critical importance of remaining vigilant in the face of increasingly sophisticated cyber threats. By staying informed and adopting robust security practices, users can better protect themselves from the ever-evolving landscape of digital dangers.