Der Banking-Trojaner Chaes installiert schädliche Chrome-Erweiterungen
Die groß angelegte Kampagne des Chaes-Bankers wurde entdeckt, dabei etwa 800 WordPress-Seiten wurden kompromittiert. The Trojan mainly targets Brazilian users and uses five malicious extensions for the Chrome browser in its attacks.
Chaes activity wurde entdeckt von Avast Experten, who report that a new malware campaign started at the end of 2021. Anfänglich, the malware was discovered back in 2020 von Cybereason Analysten, and then (as now) it was aimed at customers of Banco do Brasil, Loja Integrada, Mercado Bitcoin, Mercado Livre and Mercado Pago banks.
Now the researchers say the attack starts when the victim visits one of the hacked sites. There, the user sees a pop-up window asking to install a fake Java Runtime Anwendung.
The MSI installer for this “app” contains three malicious files (install.js, sched.js, sucesso.js) that prepare the Python environment for the next stage loader. If the user follows the instructions, the malware initiates a complex bunker delivery procedure, which ends with the deployment of several modules – including spyware and remote-access module.
Some intermediate payloads are not only encrypted, but also hidden in commented code inside the HTML pages of the awsvirtual[.]blogspot.com domain. At the final stage of the attack, the JavaScript dropper downloads and installs up to five malicious Chrome extensions on the victim’s system:
- Online – Delphi module used to fingerprint the victim and transfer system information to the hackers’ control server;
- Mtps4 (MultiTela Pascal) is a Delphi-based backdoor, the main purpose of which is to connect to the control server and wait for the response Pascal Script to be executed;
- Chrolog (ChromeLog) – steals passwords from Google Chrome, the module is also written in Delphi;
- Chronodx (Chrome Noder) is a JavaScript Trojan that, upon detecting the launch of the Chrome browser, immediately closes it and opens its own instance of Chrome containing a malicious module that steals banking information;
- Chremows (Chrome WebSocket) is a banking JavaScript Trojan that intercepts keystrokes and mouse clicks in Chrome to steal credentials (for Mercado Livre and Mercado Pago users).
Lass mich dich daran erinnern, dass wir das auch geschrieben haben Banking-Trojaner QakBot attacked over 17,000 Benutzer weltweit, und auch das Anubis Android Banker Targets Nearly 400 Benutzer der Finanz-App.