Python-based malware targets Windows, linux, and macOS and is presumed to be used by dangerous password attack groups, also known as Crypto mimics.
This group has been active since June 2019 and employs various techniques to deliver malware to the victim’s machine.
JPCERT/CC released the latest article about attacks confirmed by the campaigns and shared their analysis report.
Since the attack vector of this campaign is unknown, the infection flow after the execution of the malware is similar to that of the Linkedin attack by this group.
Initially, the malware file builder.py of the Python module is delivered to the victim machine, which downloads additional malware once it gets executed by the user.
The malware downloads and runs additional MSI files externally using a Powershell script that is dropped after the execution.
The malware communicates with the C2 server every minute and is responsible for the download and execution of additional malware.
In addition, the secondary sample of the MSI file downloaded by the Powershell script encodes the user name, OS, process information, etc. of the infected device with BASE64 and sends it to the C2 server.
The flow of an attack in the Windows environment originating from Python malware
Also, it utilizes PythonHTTPBackdoor malware with simple commands to execute the attack, which has a function to detect the OS environment, and the commands executed are slightly different depending on the environment.
Linux and macOS:
In macOS and Linux environments, the builder.py file is decoded and saved as a log. tmp, and executed as a Python file.
The user ID and OS environment information are sent to the C2 server every minute and decoded with BASE64, saving it as tmp.py.
PythonHTTPBackdoor has ROT13-encoded git-related strings in the request string and generated file name, just like a log. tmp, which indicates that Git is used. You can see that it is targeting developers.
For example, the command id 501 is used to retrieve the network and process information, and 502 is used to execute the commands in Windows, Linux, and macOS machines.
Similarly, Mach-O malware JokerSPYand node.js malware are being used by this attack group to target the victims.
Indicator of compromise
The post DangerousPassword Attacks Targeting Windows, macOS, and Linux Software Developers appeared first on Cyber Security News.
Cyber Security News