Friday, August 22, 2025
  • Home
  • About Us
  • Disclaimer
  • Contact Us
  • Terms & Conditions
  • Privacy Policy
T3llam
  • Home
  • App
  • Mobile
    • IOS
  • Gaming
  • Computing
  • Tech
  • Services & Software
  • Home entertainment
No Result
View All Result
  • Home
  • App
  • Mobile
    • IOS
  • Gaming
  • Computing
  • Tech
  • Services & Software
  • Home entertainment
No Result
View All Result
T3llam
No Result
View All Result
Home App

Hackers Utilizing Weaponized Cisco Webex Conferences App

admin by admin
June 19, 2024
in App
0
Hackers Utilizing Weaponized Cisco Webex Conferences App
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter


A novel information-stealing marketing campaign detailing the attackers’ techniques, methods, and procedures (TTPs) all through the assault lifecycle, the place the Mitre ATT&CK framework is used to categorise these TTPs and determine potential detection factors. 

By inspecting the marketing campaign’s conduct and communication with the command and management server (C2), researchers reveal the step-by-step development from preliminary entry to credential theft. 

Adversaries employed social engineering to trick customers into downloading password-protected archives (ZIP) disguised as reliable software program.

Scan Your Enterprise E-mail Inbox to Discover Superior E-mail Threats - Attempt AI-Powered Free Risk Scan

The archive filenames contained the password (!$Full_pAssW0rd_4434_$etup.zip) and embedded a RAR archive and textual content recordsdata. 

Virustotal search outcomes for related filenames

A VirusTotal search revealed round 400 related filenames submitted since 2024, indicating a broader marketing campaign, which means that the attackers are concentrating on customers by leveraging widespread search phrases for pirated software program and incorporating patterns like “!@Full_FiIe_lnSide@!” or “!@passcode_” inside filenames. 

An attacker tricked a person into working a malicious file disguised as a reliable Cisco Webex installer (Setup.exe) by exploiting a DLL side-loading vulnerability in the actual ptService.exe module to launch a hidden loader program. 

After that, the loader put itself into a unique, trusted course of (extra.com) to cover what it was doing much more, which is a multi-stage assault that mixes social engineering (T1204), DLL side-loading (T1574.002), and course of injection (T1055). 

HijackLoader, a malware loader, fetches and executes an AutoIT script (GraphicsFillRect.au3) that steals credentials and establishes a persistent connection to a C2 server, involving two MITRE ATT&CK methods.

RelatedPosts

Microsoft Cloud service again after outage: What prompted the glitch that additionally hit Starbucks app

Microsoft Cloud service again after outage: What prompted the glitch that additionally hit Starbucks app

July 30, 2024
Uber-like lawnmowing app involves Rockford | MyStateline

Uber-like lawnmowing app involves Rockford | MyStateline

July 30, 2024
Starbucks on-line ordering offline for tens of millions as outage strikes app | Cash information

Starbucks on-line ordering offline for tens of millions as outage strikes app | Cash information

July 30, 2024

T1105 (Ingress Software Switch) for downloading the script and T1071.001 (Utility Layer Protocol: Net Protocols) for sustaining communication with the C2 server, recognized as belonging to the Vidar botnet based mostly on its IP handle. 

exfiltrating to the C2 server

A malicious AutoIT script (GraphicsFillRect.au3) was detected establishing a connection to a C2 server (78.47.78.87) whereas studying login knowledge from Chrome and Firefox browsers and Zoom, suggesting knowledge exfiltration. 

In response to Trellix, the script additionally downloaded extra executables (GCGHJEBGHJ.exe and AFIEGIECGC.exe) into the ProgramData folder, indicating potential additional malicious exercise.  

downloads extra PE recordsdata

The malware exploited a COM Elevation Moniker vulnerability to bypass Consumer Account Management and acquire administrator privileges, after which disabled Home windows Defender by including itself to the exclusion checklist. 

Subsequent, the malware injected itself into MSBuild.exe, which linked to a suspicious IP handle and downloaded a cryptominer.

Lastly, the malware launched a PowerShell script that executed a sequence of obfuscated instructions, in the end side-loading a malicious DLL by a reliable VMware course of. 

Free Webinar! 3 Safety Developments to Maximize MSP Progress -> Register For Free

Previous Post

Followers react to Legend of Zelda: Echoes of Knowledge reveal with timeline hypothesis and cute art work

Next Post

OnePlus Nord CE4 Lite launching on June 24

Next Post
OnePlus Nord CE4 Lite launching on June 24

OnePlus Nord CE4 Lite launching on June 24

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Categories

  • App (3,061)
  • Computing (4,401)
  • Gaming (9,599)
  • Home entertainment (633)
  • IOS (9,534)
  • Mobile (11,881)
  • Services & Software (4,006)
  • Tech (5,315)
  • Uncategorized (4)

Recent Posts

  • WWDC 2025 Rumor Report Card: Which Leaks Had been Proper or Unsuitable?
  • The state of strategic portfolio administration
  • 51 of the Greatest TV Exhibits on Netflix That Will Maintain You Entertained
  • ‘We’re previous the occasion horizon’: Sam Altman thinks superintelligence is inside our grasp and makes 3 daring predictions for the way forward for AI and robotics
  • Snap will launch its AR glasses known as Specs subsequent 12 months, and these can be commercially accessible
  • App
  • Computing
  • Gaming
  • Home entertainment
  • IOS
  • Mobile
  • Services & Software
  • Tech
  • Uncategorized
  • Home
  • About Us
  • Disclaimer
  • Contact Us
  • Terms & Conditions
  • Privacy Policy

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Home
  • App
  • Mobile
    • IOS
  • Gaming
  • Computing
  • Tech
  • Services & Software
  • Home entertainment

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies. However you may visit Cookie Settings to provide a controlled consent.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analyticsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functionalThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessaryThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-othersThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performanceThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policyThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Save & Accept