Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Phemedrone Stealer Exploits Sensitive Data

admin by admin
Mar 1, 2024
in News
A A
0

The cybersecurity community has recently identified a new threat known as Phemedrone Stealer, a sophisticated malware that exploits a vulnerability in Microsoft Windows Defender SmartScreen, CVE-2023-36025.

This malware has been designed to steal sensitive data, including credentials from multiple platforms and cryptocurrency wallet information.

configuration extraction

Sophisticated Data Theft Tactics

Phemedrone Stealer is a . NET-compiled Trojan Stealer that employs advanced tactics to evade detection and harvest data from infected systems.

It uses a mutex checker to prevent multiple instances. It applies methods to avoid analysis by terminating processes if it detects a virtual machine environment or specific languages associated with the Commonwealth of Independent States (CIS).

Phemedrone Tag Statistic
Phemedrone Tag Statistic

Targeting Cryptocurrency Wallets

One of the most alarming capabilities of Phemedrone Stealer is its focus on cryptocurrency wallets.

It targets wallets such as Armory, Atomic, Bytecoin, Coinomi, Jaxx, Electrum, Exodus, and Guarda, attempting to extract sensitive data from specific directories that store transaction records, account information, and cryptographic keys.

The Splunk Threat Research Team has dissected the Phemedrone Stealer, providing insights into its configuration settings and operational patterns.

Phemedrone File Collection Statistic
Phemedrone File Collection Statistic

Command and Control Operations

After collecting data, Phemedrone Stealer organizes it into a zip file named in a specific format that includes the victim’s IP address and active user name, making it easier for attackers to sort through the stolen information.

The C2 server then receives this organized data, including screenshots, system information, and sensitive files from the compromised host.

Evasion and System Information Discovery

Phemedrone Stealer’s evasion techniques are particularly concerning. It checks for virtual machine identifiers and terminates if any are found.

System Information Technique
Get AV Product Installed Information “root\SecurityCenter2”, “SELECT * FROM AntivirusProduct”
Get CPU Information “SELECT * FROM Win32_Processor”
Get Geo Information hxxp[://]ip-api[.]com/json/?fields=11827
Get GPU “SELECT * FROM Win32_VideoController”
Get Hardware Information “SELECT * FROM Win32_Processor”
“SELECT * FROM Win32_DiskDrive”
Get Total RAM “SELECT * FROM Win32_ComputerSystem”
Windows “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion” , “ProductName”

Additionally, it collects detailed system information from the infected host, including installed antivirus products, CPU, GPU, and hardware information, as well as total RAM and Windows product names, using WMI commands and registry parsing.

Data Collection from Discord, Steam, and Browsers

The malware also targets data from applications like Discord and Steam, extracting account data and activities by querying specific registry keys and file names.

It has a specialized class for extracting data from web browsers, notably Chrome, where it locates critical files to decrypt and extract stored passwords and other sensitive information.

Chrome Extensions in the Crosshairs

Phemedrone Stealer targets specific Chrome extensions related to second-factor authentication, cryptocurrency management, and password management.

It collects information from these extensions and sends it back to its C2 server, potentially compromising sensitive user data.

Indicators and Detection Opportunities

The Splunk Threat Research Team has dissected the Phemedrone Stealer, providing insights into its configuration settings and operational patterns.

They have also developed a Python script, phemdrone_extractor_s.py, to extract configuration data from the malware and have identified over 150 configuration settings related to its campaign.

Phemedrone Stealer is a significant threat due to its ability to exploit a Windows SmartScreen flaw and sophisticated data theft techniques.

Its evasion tactics, targeted data collection, and organized exfiltration methods make it a formidable challenge for cybersecurity defenses.

The cybersecurity community is actively working to understand and mitigate this threat, but users and organizations must remain vigilant and ensure their systems are adequately protected against such sophisticated attacks.

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are incredibly harmful, can wreak havoc, and damage your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.



Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.