16.6 C
Canberra
Thursday, February 26, 2026

New Malware Marketing campaign Makes use of Cracked Software program to Unfold Lumma and ACR Stealer


Feb 24, 2025Ravie LakshmananEndpoint Safety / Vulnerability

New Malware Marketing campaign Makes use of Cracked Software program to Unfold Lumma and ACR Stealer

Cybersecurity researchers are warning of a brand new marketing campaign that leverages cracked variations of software program as a lure to distribute info stealers like Lumma and ACR Stealer.

The AhnLab Safety Intelligence Middle (ASEC) stated it has noticed a spike within the distribution quantity of ACR Stealer since January 2025.

A notable side of the stealer malware is the usage of a way known as lifeless drop resolver to extract the precise command-and-control (C2) server. This consists of counting on official companies like Steam, Telegram’s Telegraph, Google Varieties, and Google Slides.

“Risk actors enter the precise C2 area in Base64 encoding on a particular web page,” ASEC stated. “The malware accesses this web page, parses the string, and obtains the precise C2 area handle to carry out malicious behaviors.”

Cybersecurity

ACR Stealer, beforehand distributed through Hijack Loader malware, is able to harvesting a variety of knowledge from compromised methods, together with information, internet browser knowledge, and cryptocurrency pockets extensions.

The event comes as ASEC revealed one other marketing campaign that makes use of information with the extension “MSC,” which may be executed by the Microsoft Administration Console (MMC), to ship the Rhadamanthys stealer malware.

“There are two forms of MSC malware: one exploits the vulnerability of apds.dll (CVE-2024-43572), and the opposite executes the ‘command’ command utilizing Console Taskpad,” the South Korean firm stated.

“The MSC file is disguised as an MS Phrase doc. “When the ‘Open’ button is clicked, it downloads and executes a PowerShell script from an exterior supply. The downloaded PowerShell script incorporates an EXE file (Rhadamanthys).”

CVE-2024-43572, additionally known as GrimResource, was first documented by the Elastic Safety Labs in June 2024 as having been exploited by malicious actors as a zero-day. It was patched by Microsoft in October 2024.

Malware campaigns have additionally been noticed exploiting chat help platforms like Zendesk, masquerading as clients to trick unsuspecting help brokers into downloading a stealer known as Zhong Stealer.

In response to a current report printed by Hudson Rock, over 30,000,000 computer systems have been contaminated by info stealers within the “previous few years,” resulting in the theft of company credentials and session cookies that might then be offered by cybercriminals on underground boards to different actors for revenue.

The patrons might weaponize the entry afforded by these credentials to stage post-exploitation actions of their very own, resulting in extreme dangers. These developments serve to focus on the function performed by stealer malware as an preliminary entry vector that gives a foothold to delicate company environments.

“For as little as $10 per log (pc), cybercriminals should buy stolen knowledge from workers working in categorised protection and army sectors,” Hudson Rock stated. “Infostealer intelligence is not nearly detecting who’s contaminated — it is about understanding the complete community of compromised credentials and third-party dangers.”

Cybersecurity

Over the previous 12 months, menace actors have additionally been ramping up efforts to unfold a wide range of malware households, together with stealers and distant entry trojans (RATs), via a way known as ClickFix that usually entails redirecting customers to faux CAPTCHA verification pages instructing them to repeat and execute nefarious PowerShell instructions.

One such payload dropped is I2PRAT, which employs the I2P anonymization community to anonymize its closing C2 server.

“The malware is a complicated menace composed of a number of layers, every incorporating subtle mechanisms,” Sekoia stated. “The usage of an anonymization community complicates monitoring and hinders the identification of the menace’s magnitude and unfold within the wild.”

Discovered this text fascinating? Comply with us on Twitter and LinkedIn to learn extra unique content material we submit.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

[td_block_social_counter facebook="tagdiv" twitter="tagdivofficial" youtube="tagdiv" style="style8 td-social-boxed td-social-font-icons" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjM4IiwiZGlzcGxheSI6IiJ9LCJwb3J0cmFpdCI6eyJtYXJnaW4tYm90dG9tIjoiMzAiLCJkaXNwbGF5IjoiIn0sInBvcnRyYWl0X21heF93aWR0aCI6MTAxOCwicG9ydHJhaXRfbWluX3dpZHRoIjo3Njh9" custom_title="Stay Connected" block_template_id="td_block_template_8" f_header_font_family="712" f_header_font_transform="uppercase" f_header_font_weight="500" f_header_font_size="17" border_color="#dd3333"]
- Advertisement -spot_img

Latest Articles