Amadey Bot Spotted Deploying LockBit 3.0 Ransomware on Hacked Machines

Cyber Security

Products You May Like

The Amadey malware is being used to deploy LockBit 3.0 ransomware on compromised systems, researchers have warned.

“Amadey bot, the malware that is used to install LockBit, is being distributed through two methods: one using a malicious Word document file, and the other using an executable that takes the disguise of the Word file icon,” AhnLab Security Emergency Response Center (ASEC) said in a new report published today.

Amadey, first discovered in 2018, is a “criminal-to-criminal (C2C) botnet infostealer project,” as described by the BlackBerry Research and Intelligence Team, and is offered for purchase on the criminal underground for as much as $600.

While its primary function is to harvest sensitive information from the infected hosts, it further doubles up as a channel to deliver next-stage artifacts. Earlier this July, it was spread using SmokeLoader, a malware with not-so-different features like itself.

Just last month, ASEC also found the malware distributed under the disguise of KakaoTalk, an instant messaging service popular in South Korea, as part of a phishing campaign.

The cybersecurity firm’s latest analysis is based on a Microsoft Word file (“심시아.docx“) that was uploaded to VirusTotal on October 28, 2022. The document contains a malicious VBA macro that, when enabled by the victim, runs a PowerShell command to download and run Amadey.

In an alternative attack chain, Amadey is disguised as a seemingly harmless file bearing a Word icon but is actually an executable (“Resume.exe”) that’s propagated via a phishing message. ASEC said it was not able to identify the email used as a lure.

CyberSecurity

Succeeding in the execution of Amadey, the malware fetches and launches additional commands from a remote server, which includes the LockBit ransomware either in PowerShell (.ps1) or binary (.exe) formats.

LockBit 3.0, also known as LockBit Black, launched in June 2022, alongside a new dark web portal and the very first bug bounty program for a ransomware operation, promising rewards of up to $1 million for finding bugs in its website and software.

“As LockBit ransomware is being distributed through various methods, user caution is advised,” the researchers concluded.

Products You May Like

Articles You May Like

Atlantic Ocean Might Be Undergoing a Rapid Cooling Near Equator And Scientists Do Not Know Why
Human Brains Can Resist Decay for Up to 12,000 Years, Reveals Study
WhatsApp Developing Phone Contact Sync Toggle for Linked Devices: Report
Cyberattackers Exploit Google Sheets for Malware Control in Likely Espionage Campaign
Xiaomi 14T, Xiaomi 14T Pro Pricing and Key Specifications Leaked Ahead of Anticipated Debut

Leave a Reply

Your email address will not be published. Required fields are marked *