Your Yello Ring Road To Success
GOOGLE LOGIN MY ADS MY SHOP

Experts Shed Light On New Russian Malware-as-a-Service Written in Rust

Russian MalwareRussian Malware

A nascent information-stealing malware sold and distributed on
underground Russian underground forums has been written in Rust,
signalling a new trend where threat actors are increasingly
adopting exotic programming languages[1] to bypass security
protections, evade analysis, and hamper reverse engineering
efforts.

Dubbed “Ficker Stealer[2],” it’s notable for being
propagated via Trojanized web links and compromised websites,
luring in victims to scam landing pages purportedly offering free
downloads of legitimate paid services[3] like Spotify Music,
YouTube Premium, and other Microsoft Store applications.

Stack Overflow Teams

“Ficker is sold and distributed as Malware-as-a-Service (MaaS),
via underground Russian online forums,” BlackBerry’s research and
intelligence team said in a report published today. “Its creator,
whose alias is @ficker, offers several paid packages, with
different levels of subscription fees to use their malicious
program.”

First seen in the wild in August 2020, the Windows-based malware
is used to steal sensitive information, including login
credentials, credit card information, cryptocurrency wallets, and
browser information, in addition to functioning as a tool to grab
sensitive files from the compromised machine, and act as a
downloader to download and execute additional second-stage
malware.

Russian MalwareRussian Malware

Additionally, Ficker is known to be delivered through spam
campaigns, which involve sending targeted phishing emails with
weaponized macro-based Excel document attachments that, when
opened, drops the Hancitor[4]
loader, which then injects the final payload using a technique
called process hollowing[5]
to avoid detection and mask its activities.

malware as a servicemalware as a service

In the months that followed since its discovery, the digital
threat has been found leveraging DocuSign-themed lures to install a
Windows binary[6]
from an attacker-controlled server. CyberArk, in an analysis[7]
of the Ficker malware last month, noted its heavily obfuscated
nature and Rust roots, making the analysis more difficult, if not
prohibitive.

Prevent Ransomware Attacks

“Once the fake DocuSign document is opened and its malicious
macro code is allowed to run, Hancitor will often reach out to its
command-and-control (C2) infrastructure to receive a malicious URL
containing a sample of Ficker to download,” BlackBerry researchers said[8].

Aside from relying on obfuscation techniques, the malware also
incorporates other anti-analysis checks that prevent it from
running on virtualized environments and on victim machines located
in Armenia, Azerbaijan, Belarus, Kazakhstan, Russia, and
Uzbekistan. Also worthy of particular note is that, unlike
traditional information stealers, Ficker is designed to execute the
commands and exfiltrate the information directly to the operators
instead of writing the stolen data to disk.

“The malware also has screen-capturing abilities, which allow
the malware’s operator to remotely capture an image of the victim’s
screen. The malware also enables file-grabbing and additional
downloading capabilities once connection to its C2 is established,”
the researchers said. “Once information is sent back to Ficker’s
C2, the malware owner can access and search for all exfiltrated
data.”

References

  1. ^
    exotic
    programming languages
    (thehackernews.com)
  2. ^
    Ficker
    Stealer
    (malpedia.caad.fkie.fraunhofer.de)
  3. ^
    legitimate paid services
    (twitter.com)
  4. ^
    Hancitor
    (malpedia.caad.fkie.fraunhofer.de)
  5. ^
    process
    hollowing
    (attack.mitre.org)
  6. ^
    Windows
    binary
    (blogs.quickheal.com)
  7. ^
    analysis
    (www.cyberark.com)
  8. ^
    researchers said
    (blogs.blackberry.com)

Read more