يتم توزيع الإصدار الجديد من البرنامج الضار Jupyter من خلال أداة تثبيت MSI
Security researchers talked about a new version of the Jupyter malware, an info-stealer written in the .NET programming language that is known for attacking only medical and educational organizations.
The new chain of infection, discovered by the specialists of the information security company Morphisec on September 8, 2021, not only confirms the ongoing activity of the malware, but also demonstrates “how cybercriminals continue to develop their attacks to make them more effective and elusive.”
First documented in November 2020, ال Jupyter (also known as Solarmarker) malware was allegedly created by Russian developers and is designed to steal data from Firefox, Chrome and Chromium-based browsers.
فضلاً عن ذلك, the malware is a full-fledged backdoor and is capable of stealing data and uploading it to a remote server, uploading and executing payload. According to Morphisec, new versions of Jupyter have started to appear since May 2020.
In August 2021, Cisco Talos experts attributed the attacks to “a truly highly skilled attacker, primarily aimed at stealing credentials and other data.”
In February of this year, cybersecurity company CrowdStrike described the malware as packaged in a multi-stage, heavily obfuscated PowerShell loader, which leads to the execution of a backdoor on .NET.
Although previous attacks used legitimate files of well-known software such as Docx2Rtf and Expert PDF, the recently discovered chain of infections began to use the Nitro Pro PDF application.
The attack begins by deploying an MSI installer that is over 100 MB in size, allowing attackers to bypass anti-virus solutions. The installer is obfuscated using the third-party Advanced Installer application packer.
Let me remind you that I also talked about the fact that تم توزيع Swarez Trojan وDropper تحت ستار 15 العاب شعبية.