Malware News This new threat infects devices with a dozen malware at once

vtqhtr413

Level 27
Thread author
Well-known
Aug 17, 2017
1,609
Cybersecurity researchers from Outpost24’s Kraken Labs observed a new and quite unique malware campaign that seems to values quantity over quality.

Usually, when hackers compromise a device, they deploy a single piece of malware and try their best to remain unseen and persistent, as they use the computer for whatever end goal they have. But this new campaign, dubbed Unfurling Hemlock, does the exact opposite, making it stand out in the world of cybercrime. The researchers are saying that once the victim triggers the malware executable - in this case called ‘EXTRACT.EXE’ - they receive a handful of different malwares, infostealers, and botnet executables.

Malware cluster bomb​

The chances of the malware being picked up by cybersecurity solutions is high, but the researchers believe the attackers are hoping at least some of the payloads will survive the purge. Among the things dropped on the devices are Redline (popular infostealer), RisePro (an upcoming infostealer), Mystic Stealer (infostealing malware-as-a-service), Amadey (loader), SmokeLoader (another loader), Protection Disabler (a utility that disables Windows Defender and other security features), Enigma Packer (obfuscation tool), Healer (anti-security solution), and Performance Checker (a utility that checks and logs the performance of malware execution).
 

kailyn

Level 2
Jun 6, 2024
85

kailyn

Level 2
Jun 6, 2024
85
I would think that they are referring to the last decade but you are right, it isn't novel nor is it now ridiculous.
The attack method is not ridiculous. But not knowing that the method had been used for decades is ridiculous. Kraken Labs is the one that does not know malware history. And the article author just repeated what Kraken Labs fed to him.

There are still PUAs and PUPs that download multiple malicious software. The method of getting malware onto user systems and gaining persistence via confusion or subterfuge never ended. Rootkits of the days of old did the same thing but without being detected. Back then they thought "I have a much better chance of persistence if I install multiple malicious modules versus a single one." Sort of like a 5 year old that figures out they can carry a lot more sand with a bigger bucket. That level of thinking.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top