Article Details

Scrape Timestamp (UTC): 2024-04-05 09:47:26.673

Source: https://thehackernews.com/2024/04/from-pdfs-to-payload-bogus-adobe.html

Original Article Text

Click to Toggle View

From PDFs to Payload: Bogus Adobe Acrobat Reader Installers Distribute Byakugan Malware. Bogus installers for Adobe Acrobat Reader are being used to distribute a new multi-functional malware dubbed Byakugan. The starting point of the attack is a PDF file written in Portuguese that, when opened, shows a blurred image and asks the victim to click on a link to download the Reader application to view the content. According to Fortinet FortiGuard Labs, clicking the URL leads to the delivery of an installer ("Reader_Install_Setup.exe") that activates the infection sequence. Details of the campaign were first disclosed by the AhnLab Security Intelligence Center (ASEC) last month. The attack chain leverages techniques like DLL hijacking and Windows User Access Control (UAC) bypass to load a malicious dynamic-link library (DLL) file named "BluetoothDiagnosticUtil.dll," which, in turn, loads unleashes the final payload. It also deploys a legitimate installer for a PDF reader like Wondershare PDFelement. The binary is equipped to gather and exfiltrate system metadata to a command-and-control (C2) server and drop the main module ("chrome.exe") from a different server that also acts as its C2 for receiving files and commands. "Byakugan is a node.js-based malware packed into its executable by pkg," security researcher Pei Han Liao said. "In addition to the main script, there are several libraries corresponding to features." This includes setting up persistence, monitoring the victim's desktop using OBS Studio, capturing screenshots, downloading cryptocurrency miners, logging keystrokes, enumerating and uploading files, and grabbing data stored in web browsers. "There is a growing trend to use both clean and malicious components in malware, and Byakugan is no exception," Fortinet said. "This approach increases the amount of noise generated during analysis, making accurate detections more difficult." The disclosure comes as ASEC revealed a new campaign that propagates the Rhadamanthys information stealer under the guise of an installer for groupware. "The threat actor created a fake website to resemble the original website and exposed the site to the users using the ad feature in search engines," the South Korean cybersecurity firm said. "The malware in distribution uses the indirect syscall technique to hide from the eyes of security solutions." It also follows a discovery that a manipulated version of Notepad++ is being employed by unidentified threat actors to propagate the WikiLoader malware (aka WailingCrab). The Strategic Guide to Cloud Security Unlock practical steps to securing everything you build and run in the cloud. Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. How to Update and Automate Outdated Security Processes Download the eBook for step-by-step guidance on how to update your security processes as your business grows.

Daily Brief Summary

MALWARE // Adobe Acrobat Reader Fakes Spread Byakugan Malware

Bogus Adobe Acrobat Reader installers are being used to distribute Byakugan, a new multifunctional malware.

The malware campaign begins with a PDF file in Portuguese that, when opened, prompts the user to download a fake Reader application.

Researchers at Fortinet discovered the campaign, which includes an attack chain that effectively bypasses Windows security features and deploys a legitimate PDF reader to obscure malicious activities.

Byakugan is capable of collecting system data, executing commands from a C2 server, and includes functionalities like keystroke logging and desktop monitoring with OBS Studio.

Security firm ASEC noted a growing trend where threat actors combine clean software with malicious components to complicate analysis and detection.

Additionally, ASEC reported a separate campaign distributing the Rhadamanthys information stealer and the use of a tampered Notepad++ installer to spread WikiLoader malware.