The new version of the Jupyter malware is distributed through the MSI installer

Security researchers talked about a new version of the Jupyter malware, an info-stealer written in the .NET programming language that is known for attacking only medical and educational organizations.

The new chain of infection, discovered by the specialists of the information security company Morphisec on September 8, 2021, not only confirms the ongoing activity of the malware, but also demonstrateshow cybercriminals continue to develop their attacks to make them more effective and elusive.

First documented in November 2020, các Jupyter (also known as Solarmarker) malware was allegedly created by Russian developers and is designed to steal data from Firefox, Chrome and Chromium-based browsers.

Jupyter is an infostealer that primarily targets Chromium, Firefox, and Chrome browser data. Tuy nhiên, its attack chain, delivery, and loader demonstrate additional capabilities for full backdoor functionality.Morphisec researchers wrote.

Ngoài ra, the malware is a full-fledged backdoor and is capable of stealing data and uploading it to a remote server, uploading and executing payload. According to Morphisec, new versions of Jupyter have started to appear since May 2020.

Jupyter developer is constantly modifying and supplementing the original Jupyter in an effort to collect as much information as possible about the compromised machines. It is not yet clear what the ultimate goal of this campaign is, but in theory, stolen data can be used for sale, and hackers can use compromised machines as entry points into companies’ networks for further attacks.the researchers write.

In August 2021, Cisco Talos experts attributed the attacks toa truly highly skilled attacker, primarily aimed at stealing credentials and other data.

In February of this year, cybersecurity company CrowdStrike described the malware as packaged in a multi-stage, heavily obfuscated PowerShell loader, which leads to the execution of a backdoor on .NET.

Although previous attacks used legitimate files of well-known software such as Docx2Rtf and Expert PDF, the recently discovered chain of infections began to use the Nitro Pro PDF application.

The attack begins by deploying an MSI installer that is over 100 MB in size, allowing attackers to bypass anti-virus solutions. The installer is obfuscated using the third-party Advanced Installer application packer.

Once the MSI is launched, a PowerShell downloader is executed embedded in a legitimate Nitro Pro 13 file, the two versions of which are signed with authentic digital certificates from a valid company in Poland. Cuối cùng, the loader decodes and runs the .NET Jupyter module in memory.

Let me remind you that I also talked about the fact that Swarez Trojan and Dropper Distributed under the Disguise of 15 Popular Games.

Helga Smith

Tôi luôn quan tâm đến khoa học máy tính, đặc biệt là bảo mật dữ liệu và chủ đề, được gọi là ngày nay "khoa học dữ liệu", kể từ khi tôi còn ở tuổi thiếu niên. Trước khi vào nhóm Diệt Virus với vai trò Tổng biên tập, Tôi đã làm việc với tư cách là chuyên gia an ninh mạng tại một số công ty, bao gồm một trong những nhà thầu của Amazon. Một trải nghiệm khác: Tôi đã nhận được đang giảng dạy tại các trường đại học Arden và Reading.

Gửi phản hồi

Website này sử dụng Akismet để hạn chế spam. Tìm hiểu bình luận của bạn được duyệt như thế nào.

Nút quay lại đầu trang