Conversion Hackers
Fealse: Tech News
Free SMS Bomber Tool
  • Security

Chinese Hackers Distributing SMS Bomber Tool with Malware Hidden Inside

  • June 23, 2022
  • admin
Total
0
Shares
0
0
0

A threat cluster with ties to a hacking group called Tropic Trooper has been spotted using a previously undocumented malware coded in Nim language to strike targets as part of a newly discovered campaign.

The novel loader, dubbed Nimbda, is “bundled with a Chinese language greyware ‘SMS Bomber’ tool that is most likely illegally distributed in the Chinese-speaking web,” Israeli cybersecurity company Check Point said in a report.

“Whoever crafted the Nim loader took special care to give it the same executable icon as the SMS Bomber that it drops and executes,” the researchers said. “Therefore the entire bundle works as a trojanized binary.”

SMS Bomber, as the name indicates, allows a user to input a phone number (not their own) so as to flood the victim’s device with messages and potentially render it unusable in what’s a denial-of-service (DoS) attack.

CyberSecurity

The fact that the binary doubles up as SMS Bomber and a backdoor suggests that the attacks are not just aimed at those who are users of the tool — a “rather unorthodox target” — but also highly targeted in nature.

Tropic Trooper, also known by the monikers Earth Centaur, KeyBoy, and Pirate Panda, has a track record of striking targets located in Taiwan, Hong Kong, and the Philippines, primarily focusing on government, healthcare, transportation, and high-tech industries.

Calling the Chinese-speaking collective “notably sophisticated and well-equipped,” Trend Micro last year pointed out the group’s ability to evolve their TTPs to stay under the radar and rely on a broad range of custom tools to compromise its targets.

The latest attack chain documented by Check Point begins with the tampered SMS Bomber tool, the Nimbda loader, which launches an embedded executable, in this case the legitimate SMS bomber payload, while also also injecting a separate piece of shellcode into a notepad.exe process.

This kicks off a three-tier infection process that entails downloading a next-stage binary from an obfuscated IP address specified in a markdown file (“EULA.md”) that’s hosted in an attacker-controlled GitHub or Gitee repository.

CyberSecurity

The retrieved binary is an upgraded version of a trojan named Yahoyah that’s designed to collect information about local wireless networks in the victim machine’s vicinity as well as other system metadata and exfiltrate the details back to a command-and-control (C2) server.

Yahoyah, for its part, also acts as a conduit to fetch the final-stage malware, which is downloaded in the form of an image from the C2 server. The steganographically-encoded payload is a backdoor known as TClient and has been deployed by the group in previous campaigns.

“The observed activity cluster paints a picture of a focused, determined actor with a clear goal in mind,” the researchers concluded.

“Usually, when third-party benign (or benign-appearing) tools are hand-picked to be inserted into an infection chain, they are chosen to be the least conspicuous possible; the choice of an ‘SMS Bomber’ tool for this purpose is unsettling, and tells a whole story the moment one dares to extrapolate a motive and an intended victim.”



Total
0
Shares
Share 0
Tweet 0
Pin it 0
admin

Previous Article
Dreamy, vibrant, and at times unsettling, Zhong Lin’s striking images are inspired by her diverse upbringing
  • Photography

Dreamy, vibrant, and at times unsettling, Zhong Lin’s striking images are inspired by her diverse upbringing

  • June 23, 2022
  • admin
View Post
Next Article
Nothing Phone 1 Invite-Only Pre-Order Pass Reservation Begins in India
  • Reviews

Nothing Phone 1 Specifications Tipped, Initial Availability Set via Invite System

  • June 23, 2022
  • admin
View Post
You May Also Like
Learn NIST Inside Out With 21 Hours of Training @ 86% OFF
View Post
  • Security

Learn NIST Inside Out With 21 Hours of Training @ 86% OFF

  • admin
  • June 25, 2022
Threat Intelligence Services Are Universally Valued by IT Staff
View Post
  • Security

Threat Intelligence Services Are Universally Valued by IT Staff

  • admin
  • June 24, 2022
Astrix Security Emerges From Stealth With $15M Seed Round
View Post
  • Security

Why We’re Getting Vulnerability Management Wrong

  • admin
  • June 24, 2022
CISA, Australia, Canada, New Zealand, & UK Issue Joint Advisory on Russian Cyber Threats
View Post
  • Security

APT Groups Swarming on VMware Servers with Log4Shell

  • admin
  • June 24, 2022
View Post
  • Security

Only 3% of Open Source Software Bugs Are Actually Attackable, Researchers Say

  • admin
  • June 24, 2022
SaaS in the Enterprise: The Good, the Bad, and the Unknown
View Post
  • Security

7 Steps to Stronger SaaS Security

  • admin
  • June 24, 2022
Instagram’s new age verification tool – Week in security with Tony Anscombe
View Post
  • Security

Instagram’s new age verification tool – Week in security with Tony Anscombe

  • admin
  • June 24, 2022
Mitel VoIP Zero-Day
View Post
  • Security

Hackers Exploit Mitel VoIP Zero-Day Bug to Deploy Ransomware

  • admin
  • June 24, 2022

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Categories
  • Apps
  • Games
  • How To
  • News
  • Photography
  • Reviews
  • Security

Input your search keywords and press Enter.