How Windows utilities threaten your security by bypassing the protection

Citizen
Citizen Sec, 17-10-2024

Researchers from the French company HarfangLab have discovered a new malware campaign that distributes a dangerous loader called Hijack Loader. This loader uses legitimate digital signature certificates. The attackers launched their attacks in early October, and their goal is to install a data theft program known as Lumma.
Hijack Loader, also called DOILoader and SHADOWLADDER, first became known in September 2023. It is distributed through fake files that pose as pirated software or movies. New versions of the attacks direct users to fake CAPTCHA pages, where they are asked to enter data and run a malicious PowerShell command that downloads the infected file.
HarfangLab has noticed three variants of the malicious PowerShell script since mid-September. These scripts use Windows tools such as "mshta.exe " and "msiexec.exe ", to execute code and download malicious data from remote servers.
The files downloaded by the victims contain both legitimate programs and malicious components that download Hijack Loader. The malicious file decrypts and runs the encoded data intended to steal information.
Since October 2024, attackers have started using signed files instead of DLLs to avoid detection by antiviruses. Although it is unclear whether all the certificates were stolen, experts suggest that some of them may have been created by hackers. The certificates used to sign the malware have already been revoked.
Be careful and do not download programs from unreliable sources!
You will be interested
Как защитить детей в цифровом мире: почему безопасность в интернете — это важно
Современные дети растут в эпоху цифровых технологий — смартфоны, планшеты, социальные сети и онлайн-игры стали неотъемлемой частью их жизни. Интернет открывает массу возможностей для учёбы, творчества и общения, но вместе с этим приносит и серьёзные риски.

@citizensec
30-05-2025Регламент по использованию корпоративной электронной почты
Правила использования корпоративной почты: что разрешено, что запрещено, меры безопасности и ответственность.

@CitizenSec
19-05-2025Women in cybersecurity from Kazakhstan
The special edition is dedicated to women in cybersecurity who overcome challenges, inspire others, and make the world safer. We share the stories of three professionals, their paths in cybersecurity, career advice, and tips on online security. Learn how to start your journey in cybersecurity and grow in this dynamic field.

@citizensec
03-05-2025Attention to Everyday IT Tools: New Tactic of a Chinese Spy Group
Microsoft Warns: Chinese Spy Group Uses Everyday IT Tools to Hack Networks

@turin.medet
06-03-2025Zebo-0.1.0 and Cometlogger-0.1: Dangerous Programs Stealing Data and Controlling Computers
Experts have discovered two dangerous programs that seem harmless at first. These programs can steal personal data, monitor computer activity, and even take control of the system.

@CitizenSec
26-12-2024Postman Workspaces Expose Over 30,000 API Keys and Sensitive Tokens
Thousands of Postman workspaces accidentally revealed sensitive data such as API keys and access tokens. Learn how to secure your API development environment and protect your organization's data.

@CitizenSec
21-11-2024New SteelFox Trojan mimics software activators, stealing sensitive data and mining cryptocurrency
SteelFox was first identified in August 2023, but its activity has increased markedly. More than 11,000 infection attempts have been recorded in recent months.

@CitizenSec
11-11-2024Critical vulnerability CVE-2024-43093 threatens the security of Android users
This problem allows hackers to gain unauthorized access to important Android system folders.

@CitizenSec
05-11-2024ChatGPT was persuaded to create an exploit by slipping instructions in 16-bit format
A Mozilla researcher has proposed a new way to bypass content filters in large language models (LM) used to prevent abuse.

@CitizenSec
01-11-2024A new tool to bypass cookie encryption in Google Chrome: how does it work and what does it mean for your online security?
Recently, cybersecurity researcher Alexander Hagen has developed a tool that can bypass a new security feature in Google Chrome called App-Bound Encryption.

@CitizenSec
30-10-2024