• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

Aurora infostealer malware increasingly adopted by cybergangs

Bill Toulas by Bill Toulas
November 21, 2022
Reading Time: 3 mins read
0
Aurora infostealer malware increasingly adopted by cybergangs

Stealer

RELATED POSTS

CISA warns govt agencies of recently patched Barracuda zero-day

QBot malware abuses Windows WordPad EXE to infect devices

Hot Pixels attack checks CPU temp, power changes to steal data

Cybercriminals are increasingly turning to a new Go-based information stealer named ‘Aurora’ to steal sensitive information from browsers and cryptocurrency apps, exfiltrate data directly from disks, and load additional payloads.

According to cybersecurity firm SEKOIA, at least seven notable cybergangs with significant activity have adopted Aurora exclusively, or along with Redline and Raccoon, two other established information-stealing malware families.

One of the cybergangs boasting about using Aurora
Cybergang boasting use of Aurora along Raccoon
Source: SEKOIA

The reason for this sudden rise in Aurora’s popularity is its low detection rates and general unknown status, making its infections less likely to be detected.

Simultaneously, Aurora offers advanced data-stealing features and presumably infrastructural and functional stability.

Aurora history

Aurora was first announced in April 2022 on Russian-speaking forums, advertised as a botnet project with state-of-the-art info-stealing and remote access features.

As KELA reported earlier this year, Aurora’s author was looking to form a small team of testers to ensure the final product is good enough.

Buy JNews
ADVERTISEMENT

However, in late August 2022, SEKOIA noticed that Aurora was advertised as a stealer, so the project abandoned its goal of creating a multi-function tool.

The highlight features listed in the promotional posts are:

  • Polymorphic compilation that doesn’t require crypter wrapping
  • Server-side data decryption
  • Targets over 40 cryptocurrency wallets
  • Automatic seed phrase deduction for MetaMask
  • Reverse lookup for password collection
  • Runs on TCP sockets
  • Communicates with C2 only once, during license check
  • Fully native small payload (4.2 MB) requiring no dependencies

The above features are geared towards high-level stealthiness, which is the main advantage of Aurora over other popular info-stealers.

The cost to rent the malware was set to $250 per month or $1,500 for a lifetime license.

Stealer analysis

Upon execution, Aurora runs several commands through WMIC to collect basic host information, snaps a desktop image, and sends everything to the C2.

Commands Aurora executes upon launch
Commands Aurora executes upon launch
Source: SEKOIA

Next, the malware targets data stored in multiple browsers (cookies, passwords, history, credit cards), cryptocurrency browser extensions, cryptocurrency wallet desktop apps, and Telegram.

The targeted desktop wallet apps include Electrum, Ethereum, Exodus, Zcash, Armory, Bytecoin, Guarda, and Jaxx Liberty.

All stolen data is bundled in a single base64-encoded JSON file and exfiltrated to the C2 through TCP ports 8081 or 9865.

SEKOIA reports they couldn’t confirm the existence of a working file grabber as the author of the malware promises.

However, the analysts observed Aurora’s malware loader that uses “net_http_Get” to drop a new payload onto the filesystem using a random name and then use PowerShell to execute it.

The payload loader function
The payload loader function
Source: SEKOIA

Current distribution

Currently, Aurora is distributed to victims via various channels, which is to be expected considering the involvement of seven distinct operators.

SEKOIA noticed cryptocurrency phishing sites promoted via phishing emails and YouTube videos that link to fake software and cheat catalog sites.

One of the sites used for malware distribution
One of the sites used for malware distribution
Source: BleepingComputer

For a complete list of the IoCs (indicators of compromise) and sites used for Aurora distribution, check SEKOIA’s GitHub repository.

Share54Tweet34Pin12
Bill Toulas

Bill Toulas

Related Posts

CISA orders govt agencies to update iPhones, Macs by May 1st
Cyber Security

CISA warns govt agencies of recently patched Barracuda zero-day

May 27, 2023
New QakNote attacks push QBot malware via Microsoft OneNote files
Cyber Security

QBot malware abuses Windows WordPad EXE to infect devices

May 27, 2023
Hot Pixels attack checks CPU temp, power changes to steal data
Cyber Security

Hot Pixels attack checks CPU temp, power changes to steal data

May 27, 2023
Time to challenge yourself in the 2023 Google CTF!
Cyber Security

Time to challenge yourself in the 2023 Google CTF!

May 26, 2023
Time to challenge yourself in the 2023 Google CTF!
Cyber Security

Time to challenge yourself in the 2023 Google CTF!

May 26, 2023
The Week in Ransomware – December 16th 2022 – Losing Trust
Cyber Security

The Week in Ransomware – May 26th 2023 – Cities Under Attack

May 26, 2023

Recommended Stories

Microsoft 365 outage takes down Teams, Exchange Online, Outlook

Microsoft 365 outage blocks access to web apps and services

April 20, 2023
Assessing PancakeSwap’s performance during the concluding weeks of Q1

Assessing PancakeSwap’s performance during the concluding weeks of Q1

April 13, 2023
I asked ChatGPT Ethereum’s [ETH] higher purpose, it said…

I asked ChatGPT about Ethereum’s prices, it seemed pretty optimistic

May 7, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • New Windows Server updates cause domain controller freezes, restarts

    136 shares
    Share 54 Tweet 34
  • Bing Chat’s secret modes turn it into a personal assistant or friend

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • XRP settlement: A turning point in US crypto regulations?
  • Uniswap spikes despite StarkNet; Avalanche in pursuit?
  • Avorak AI: A leading force in the crypto space

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?