An ongoing phishing marketing campaign is using copyright infringement-related themes to trick victims into downloading a more recent model of the Rhadamanthys data stealer since July 2024.
Cybersecurity agency Test Level is monitoring the large-scale marketing campaign below the title CopyRh(ight)adamantys. Focused areas embody the USA, Europe, East Asia, and South America.
“The campaign impersonates dozens of companies, while each email is sent to a specific targeted entity from a different Gmail account, adapting the impersonated company and the language per targeted entity,” the corporate stated in a technical evaluation. “Almost 70% of the impersonated companies are from the Entertainment /Media and Technology/Software sectors.”
The assaults are notable for the deployment of model 0.7 of the Rhadamanthys stealer, which, as detailed by Recorded Future’s Insikt Group early final month, incorporates synthetic intelligence (AI) for optical character recognition (OCR).
The Israeli firm stated the exercise overlaps with a marketing campaign that Cisco Talos disclosed final week as focusing on Fb enterprise and promoting account customers in Taiwan to ship Lumma or Rhadamanthys stealer malware.
The assault chains are characterised by way of spear-phishing ways that entail sending electronic mail messages claiming purported copyright violations by masquerading as well-known corporations.
These emails are despatched from Gmail accounts and declare to be from authorized representatives of the impersonated corporations. The contents of the message accuse the recipients of misusing their model on social media platforms and request them to take away the involved photographs and movies.
“The removal instructions are said to be in a password-protected file. However, the attached file is a download link to appspot.com, linked to the Gmail account, which redirects the user to Dropbox or Discord to download a password-protected archive (with the password provided in the email),” Test Level stated.
The RAR archive incorporates three parts, a professional executable susceptible to DLL side-loading, the malicious DLL containing the stealer payload, and a decoy doc. As soon as the binary is run, it sideloads the DLL file, which then paves the best way for the deployment of Rhadamanthys.
Test Level, which attributed the marketing campaign to a possible cybercrime group, stated that it is attainable the risk actors have utilized AI instruments given the size of the marketing campaign and the number of the lures and sender emails.
“The campaign’s widespread and indiscriminate targeting of organizations across multiple regions suggests it was orchestrated by a financially motivated cybercrime group rather than a nation-state actor,” it stated. “Its global reach, automated phishing tactics, and diverse lures demonstrate how attackers continuously evolve to improve their success rates.”
New SteelFox Malware Exploits Susceptible Driver
The findings come as Kaspersky make clear a brand new “full-featured crimeware bundle” dubbed SteelFox that is propagated by way of boards posts, torrent trackers, and blogs, passing off as professional utilities like Foxit PDF Editor, JetBrains, and AutoCAD.
The marketing campaign, relationship again to February 2023, has claimed victims internationally, significantly these situated in Brazil, China, Russia, Mexico, UAE, Egypt, Algeria, Vietnam, India, and Sri Lanka. It has not been attributed to any identified risk actor or group.
“Delivered via sophisticated execution chains including shellcoding, this threat abuses Windows services and drivers,” safety researcher Kirill Korchemny stated. “It also uses stealer malware to extract the victim’s credit card data as well as details about the infected device.”
The place to begin is a dropper app that impersonates cracked variations of common software program, which, when executed, asks for administrator entry and drops a next-stage loader that, in flip, establishes persistence and launches the SteelFox DLL.
The admin entry is subsequently abused to create a service that runs an older model of WinRing0.sys, a {hardware} entry library for Home windows that is susceptible to CVE-2020-14979 and CVE-2021-41285, thereby permitting the risk actor to acquire NTSYSTEM privileges.
“This driver is also a component of the XMRig miner, so it is utilized for mining purposes,” Korchemny famous. “After initializing the driver, the sample launches the miner. This represents a modified executable of XMRig with junk code fillers. It connects to a mining pool with hardcoded credentials.”
The miner, for its half, is downloaded from a GitHub repository, with the malware additionally initiating contact with a distant server over TLS model 1.3 to exfiltrate delicate information from internet browsers, resembling cookies, bank card information, shopping historical past, and visited locations, system metadata, put in software program, and timezone, amongst others.
“Highly sophisticated usage of modern C++ combined with external libraries grant this malware formidable power,” Kaspersky stated. “Usage of TLSv1.3 and SSL pinning ensures secure communication and harvesting of sensitive data.”