Article Details
Scrape Timestamp (UTC): 2024-04-04 19:31:44.433
Original Article Text
Click to Toggle View
Visa warns of new JSOutProx malware variant targeting financial orgs. Visa is warning about a spike in detections for a new version of the JsOutProx malware targeting financial institutions and their customers. In a security alert from Visa's Payment Fraud Disruption (PDF) unit seen by BleepingComputer and sent to card issuers, processors, and acquirers, Visa says they became aware of a new phishing campaign distributing the remote access trojan on March 27, 2024. This campaign targeted financial institutions in South and Southeast Asia, the Middle East, and Africa. First encountered in December 2019, JsOutProx is a remote access trojan (RAT) and highly obfuscated JavaScript backdoor that allows its operators to run shell commands, download additional payloads, execute files, capture screenshots, establish persistence on the infected device, and control the keyboard and mouse. "While PFD could not confirm the ultimate goal of the recently identified malware campaign, this eCrime group may have previously targeted financial institutions to conduct fraudulent activity," reads the Visa alert seen by BleepingComputer. The alert provides indicators of compromise (IoCs) related to the latest campaign and recommends several mitigation actions, including raising awareness about phishing risks, enabling EMV and secure acceptance technologies, securing remote access, and monitoring for suspicious transactions. The phishing campaign A related report by Resecurity dives deeper into the JSOutProx phishing operation details, explaining that the malware has evolved its latest version for better evasion and now uses GitLab to host its payloads. In the observed attacks against banking customers, Resecurity saw fabricated financial notifications sent to targets via emails that impersonate legitimate institutions, presenting them with fake SWIFT or MoneyGram payment notifications. Attached to the emails are ZIP archives containing .js files that, when executed, download the malicious JSOutProx payloads from a GitLab repository. The first stage of the JSOutProx implant supports a range of commands that enable the attackers to perform basic functionalities such as updating it, managing its sleep time for operational discretion, executing processes, and exiting the implant when necessary. The second stage of the implant introduces additional plugins that significantly expand the range of malicious activities the attackers can perform and include the following: Resecurity says early operations of JSOutProx were attributed to a threat actor named 'Solar Spider,' but there's no concrete attribution for the latest campaign. Based on the attacks' sophistication, the targets' profile, and their geography, the analysts estimate with moderate confidence that JSOutProx is operated by Chinese or China-affiliated threat actors.
Daily Brief Summary
Visa's Payment Fraud Disruption unit reports a new phishing campaign leveraging a sophisticated variant of the JSOutProx malware.
Financial institutions and their clients in Asia, the Middle East, and Africa are primarily targeted by the attacks.
JSOutProx operates as a RAT, allowing attackers to execute shell commands and control infected devices for fraudulent activities.
The campaign uses phishing tactics, sending fake financial notifications and employing GitLab repositories to host malware payloads.
Visa provided indicators of compromise and recommended actions, including enhancing phishing awareness and securing remote access protocols.
Analysts suggest with moderate confidence that the JSOutProx RAT is likely linked to Chinese or China-affiliated cyber actors.
In comparison to its initial detection in 2019, the latest version of JSOutProx has improved evasion techniques and functionalities.