Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

WogRAT Malware Exploits Notepad Service To Attack Windows & Linux Systems

admin by admin
Mar 6, 2024
in News
A A
0

Malware can use the Notepad service to attack systems such as Windows and Linux since Notepad is a widely used application on most operating systems.

Through malware, it is possible to use this tool to exploit system resources and user privileges, thereby allowing unauthorized access or execution of malicious codes.

There is also less suspicion from clients concerning the legitimacy of undetected malware payloads that may be carried by well-known software like Notepad.

Cybersecurity analysts at ASEC recently discovered that threat actors are actively using new WogRAT malware that exploits the notepad service to exploit Windows and Linux systems.

Document

Integrate ANY.RUN in your company for Effective Malware Analysis

Malware analysis can be fast and simple. Just let us show you the way to:

  • Interact with malware safely
  • Set up virtual machine in Linux and all Windows OS versions
  • Work in a team
  • Get detailed reports with maximum data
  • If you want to test all these features now with completely free access to the sandbox: ..

WogRAT Malware Exploits Notepad Service

AhnLab’s team uncovered a backdoor trojan spreading through aNotepad, an online notepad service.

The malicious code targets Windows (PE format) and Linux (ELF format) systems. 

This malware is dubbed ‘WogRAT’ due to the ‘WingOfGod’ string used by its creators, and since it’s a multi-platform threat so, it poses a serious risk.

aNotepad platform (Source – ASEC)

WogRAT has been active since late 2022 and is a multi-platform threat.

For Windows, it masquerades as utilities like “flashsetup_LL3gjJ7.exe” or “BrowserFixup.exe” to lure victims. 

While Linux attacks are unconfirmed, VirusTotal data suggests Asian nations like Hong Kong, Singapore, China, and Japan are prime targets of this cunning malware campaign.

Dissecting a Windows WogRAT sample masquerading as an Adobe tool, we find a .NET-based Chrome utility guise concealing an encrypted downloader.

Encrypted source code (Source – ASEC)

Upon execution, it self-compiles and loads a DLL to fetch and Base64-decode strings from aNotepad which reveals an obfuscated .NET binary payload cached on the online notepad service.

Command downloads from C&C contain instructions like type, task ID, and associated data. For instance, an ‘upldr’ task would read ‘C:malware.exe’ and FTP uploads it to the server. 

While the analyzed sample uses a test URL lacking upload capability, other WogRAT variants likely leverage this file exfiltration functionality.

AhnLab has uncovered a Linux variant with the same C&C infrastructure as its Windows equivalent, even though WogRAT’s initial vector is unclear. 

Just like Rekoobe, this strain uses activities from Tiny SHell malware that is open-source.

When it runs, it disguises itself under the name “[kblockd]”, collects system metadata for exfiltration, and behave exactly as the Windows version of it does.

Linux payloads lack download functionality but encrypt C&C communications before transmission.

Rather than receiving commands directly, Linux WogRAT fetches a reverse shell address from C&C and connects to receive instructions. 

This suggests the threat actor has a Tiny SHell server infrastructure, as WogRAT incorporates routines and C&C mechanisms from this open-source malware, including AES-128 encryption via HMAC SHA1 and unaltered 0x10 byte integrity checks.

AhnLab discovered WogRAT malware targeting Windows and Linux. Threat actors may disguise malicious files as utilities by luring downloads. 

Researchers recommended avoiding untrusted executables and getting programs from official sources.

Not only that even they also recommended updating V3 to prevent infections.

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are incredibly harmful, can wreak havoc, and damage your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter



Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.