- Aug 17, 2017
- 1,609
Cybersecurity researchers from Outpost24’s Kraken Labs observed a new and quite unique malware campaign that seems to values quantity over quality.
Usually, when hackers compromise a device, they deploy a single piece of malware and try their best to remain unseen and persistent, as they use the computer for whatever end goal they have. But this new campaign, dubbed Unfurling Hemlock, does the exact opposite, making it stand out in the world of cybercrime. The researchers are saying that once the victim triggers the malware executable - in this case called ‘EXTRACT.EXE’ - they receive a handful of different malwares, infostealers, and botnet executables.
Malware cluster bomb
The chances of the malware being picked up by cybersecurity solutions is high, but the researchers believe the attackers are hoping at least some of the payloads will survive the purge. Among the things dropped on the devices are Redline (popular infostealer), RisePro (an upcoming infostealer), Mystic Stealer (infostealing malware-as-a-service), Amadey (loader), SmokeLoader (another loader), Protection Disabler (a utility that disables Windows Defender and other security features), Enigma Packer (obfuscation tool), Healer (anti-security solution), and Performance Checker (a utility that checks and logs the performance of malware execution).
This new threat infects devices with a dozen malware at once
Unfurling Hemlock doesn't bother trying to hide itself
www.techradar.com