• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

BitRAT malware campaign uses stolen bank data for phishing

Sergiu Gatlan by Sergiu Gatlan
January 3, 2023
Reading Time: 2 mins read
0
BitRAT malware campaign uses stolen bank data for phishing

Phishing attack

RELATED POSTS

New Horabot campaign takes over victim’s Gmail, Outlook accounts

Windows 11 will let you view phone photos in File Explorer

Harvard Pilgrim Health Care ransomware attack hits 2.5 million people

Threat actors behind a recent malware campaign have been using the stolen information of bank customers in Colombia as lures in phishing emails designed to infect them with the BitRAT remote access trojan, according to cloud security firm Qualys.

The company found that the infrastructure of an undisclosed Colombian cooperative bank had been hijacked by attackers while investigating BitRAT lures in active phishing attacks.

A total of 418,777 records containing sensitive customer data, including names, phone numbers, email addresses, addresses, Colombian national IDs, payment records, and salary information, were stolen from the breached servers.

While investigating the campaign, Qualys also discovered evidence that the attackers had accessed customers’ data, including logs showing that they looked for SQL injection bugs using the sqlmap tool.

“Moreover, the lures themselves contain sensitive data from the bank to make them appear legitimate. This means that the attacker has gotten access to customers’ data,” Qualys said.

“While digging deeper into the infrastructure we identified logs that point to the usage of the tool sqlmap to find potential SQLi faults, along with actual database dumps.”

Buy JNews
ADVERTISEMENT

At the moment, none of the information stolen from the Colombian bank’s servers has been found on dark web or clearweb sites monitored by Qualys.

The malware is delivered to victims’ computers via a malicious Excel file that drops and executes an INF file encoded within a highly obfuscated macro bundled with the attachment.

Excel BitRAT lure
Excel BitRAT lure (Qualys)

The final BitRAT payload is then downloaded from a GitHub repository using the WinHTTP library on the compromised device and executed with the help of the WinExec function.

During the last stage of the attack, the RAT malware moves its loader to the Windows startup folder to gain persistence and automatically restart after system reboots.

Since at least August 2020, BitRAT has been sold as off-the-shelf malware on dark web markets and cybercrime forums for as little as $20 for lifetime access.

After paying for a license, each “customer” uses their own approach to infect victims with this malware, such as phishing, watering holes, and trojanized software.

The highly versatile BitRAT can be used for a variety of malicious purposes, including recording video and audio, data theft, DDoS attacks, cryptocurrency mining, and delivering additional payloads.

“Commercial off the shelf. RATs have been evolving their methodology to spread and infect their victims,” said Qualys threat research senior engineer Akshat Pradhan.

“They have also increased the usage of legitimate infrastructures to host their payloads and defenders need to account for it.”

Share54Tweet34Pin12
Sergiu Gatlan

Sergiu Gatlan

Related Posts

Beware: Hackers now use OneNote attachments to spread malware
Cyber Security

New Horabot campaign takes over victim’s Gmail, Outlook accounts

June 1, 2023
Windows 11 will let you view phone photos in File Explorer
Cyber Security

Windows 11 will let you view phone photos in File Explorer

June 1, 2023
Latitude cyberattack leads to data theft at two service providers
Cyber Security

Harvard Pilgrim Health Care ransomware attack hits 2.5 million people

June 1, 2023
Apple fixes recently disclosed zero-days on older iPhones and iPads
Cyber Security

Russia says US hacked thousands of iPhones in iOS zero-click attacks

June 1, 2023
Hackers turn to Google search ads to push info-stealing malware
Cyber Security

Google triples rewards for Chrome sandbox escape chain exploits

June 1, 2023
OSV and the Vulnerability Life Cycle
Cyber Security

Announcing the Chrome Browser Full Chain Exploit Bonus

June 1, 2023

Recommended Stories

75k WordPress sites impacted by critical online course plugin flaws

WordPress force patching WooCommerce plugin with 500K installs

March 23, 2023
Polkadot (DOT) Price Prediction 2025-2030: DOT to the moon with Spacewalk?

Polkadot (DOT) Price Prediction 2025-2030: DOT to the moon with Spacewalk?

April 2, 2023
Shiba Inu vs Dogecoin: Which meme owns the next bull cycle?

Shiba Inu vs Dogecoin: Which meme owns the next bull cycle?

May 3, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • New Windows Server updates cause domain controller freezes, restarts

    136 shares
    Share 54 Tweet 34
  • Bing Chat’s secret modes turn it into a personal assistant or friend

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • XRP traders, know this about the ‘golden pocket’
  • New Horabot campaign takes over victim’s Gmail, Outlook accounts
  • LTC surprises investors with promising gains; this is what could happen next

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?