Mars’ Mars

The new Mars infostealer is still gaining popularity in the hacker community, and analysts are already marking the first large-scale campaigns using it.

Mars is a redesigned version of the Oski kötü amaçlı yazılım, which was discontinued in 2020. The malware is highly capable of stealing information and attacks a very wide range of applications, including popular browsers, two-factor authentication plugins, as well as many extensions and wallets for working with cryptocurrencies.

Mars also collects and sends to its operators the following information about the victim’s system:

  1. IP address and country;
  2. path to EXE file;
  3. local time and time zone;
  4. system language;
  5. language keyboard layout;
  6. laptop or desktop;
  7. processor model;
  8. computer name;
  9. username;
  10. computer name in the domain;
  11. machine identifier;
  12. GUID;
  13. installed programs and their versions.

Yeni Tarrask kötü amaçlı yazılımı
Mars Admin

Advertised on many hacking forums for between $140 ve $160 ömür boyu lisans için, Mars has grown rather slowly until recently, but it looks like the recent shutdown of Raccoon Stealer has forced hackers to look for alternatives and take a look at Mars. It got to the point that the authors of the malware wrote that they could barely cope with the influx of new customers.

Yeni Tarrask kötü amaçlı yazılımı

En sık, this malware is distributed through spam emails containing an executable file in an archive, a download link, or a malicious document. ancak, sometimes Mars is also distributed through fraudulent sites. One of these campaigns, which is definitely getting bigger after the influx of customers, was discovered by experts at Morfisek. analistler fidye yazılımının gerçek olduğunu onayladı, the malware uses Google Ads to bring clone sites of the open source OpenOffice to the top positions in search results in Canada.

The OpenOffice installer on such a fake site is a Mars executable packaged with the Babadeda cryptor or the Autoit bootloader.

ilginç bir şekilde, shortly after the release of Mars, a hacked version of the malware with instructions appeared, which has serious flaws. Özellikle, it prescribes to set up full access (777) to the entire project, including the directory with the logs of the victims.

The logs are a ZIP file containing data stolen by the malware from users and uploaded to the C&C sunucusu. The inaccuracy in the instructions has led to the fact that attackers misconfigure their environment, revealing important information to the whole world.

The researchers found that, as part of the campaign mentioned above, the stolen information included browser autofill data, browser extension data, bank card information, IP address, country code and time zone.

Yeni Tarrask kötü amaçlı yazılımı

Since the malware operator who followed the instructions infected himself with a copy of Mars (apparently during debugging), his personal data was also disclosed. This miscalculation allowed Morphisec experts to link the attacks to the Russian-speaking user, finding his GitLab hesaplar, stolen credentials used to pay for Google Ads, ve dahası.

The Morphisec Labs team reports that in total they were able to identify more than 50 infected domain users who compromised their companiesdomain passwords. The vast majority of victims are students, educators and content creators who were looking for legitimate apps but got malware instead.

Morphisec was also able to isolate credentials that led to the complete compromise of an unnamed infrastructure solutions provider from Canada and a number of well-known Canadian service companies. Experts have already contacted the victims and notified the authorities about the incident.

Şu gerçeği de konuştuğumuzu hatırlatmama izin verin. çoğu, uygulamanın sınırlı işlevselliğe sahip olduğu ve Facebook üzerinden giriş gerektirdiği konusunda uyarıyor 100,000 çoğu, uygulamanın sınırlı işlevselliğe sahip olduğu ve Facebook üzerinden giriş gerektirdiği konusunda uyarıyor, kötü amaçlı yazılım, şirket onlara ödeme yaparsa, yararlandıkları sıfırıncı gün güvenlik açığının tüm ayrıntılarını ifşa etmeye hazır olduklarını yazıyor KöpekbalığıBot Android Trojan Kripto Para Birimi Çaldı ve Banka Hesaplarını Hackledi.

Helga Smith

Bilgisayar bilimlerine her zaman ilgi duymuşumdur., özellikle veri güvenliği ve tema, günümüzde denilen "veri bilimi", ilk gençlik yıllarımdan beri. Baş Editör olarak Virüs Temizleme ekibine gelmeden önce, Birkaç şirkette siber güvenlik uzmanı olarak çalıştım, Amazon'un yüklenicilerinden biri dahil. Başka bir deneyim: Arden ve Reading üniversitelerinde öğretmenlik var.

Cevap bırakın

Bu site spam azaltmak için Akismet kullanır. Yorumunuz verileri işlenirken öğrenin.

Başa dön tuşu