malware

Dark Gate’s Malware Volume Campaign is rented out to Affiliates

3 Mins Read

PureVPNNewsDark Gate’s Malware Volume Campaign is rented out to Affiliates

A new malicious spam activity has been detected, involving deploying an off-the-shelf malware named DarkGate.

“This recent surge in DarkGate malware operations is believable because the malware developer has recently begun renting it out to a select group of associates,” stated a Telekom Security report released just last week.

Discovery Point

This report builds upon recent discoveries by a security researcher who unveiled a “high-volume campaign.” This campaign cleverly exploits compromised email conversations to deceive recipients into unwittingly downloading the malware.

The execution flow of the campaign.
  • The attack sequence begins with a phishing link that, upon being clicked, goes through a traffic routing system (TDS). 
  • This leads the victim to an MSI payload, but only under specific conditions, such as the presence of a refresh header in the HTTP response.
  • When the MSI file is opened, a multi-stage process is triggered. This involves an AutoIt script that initiates shellcode, which acts as a bridge to decrypt and launches DarkGate via a crypter (or loader).

Variations to attack

In a slightly different variation, attackers have been observed using a Visual Basic Script instead of an MSI file. This script, in turn, employs cURL to retrieve the AutoIt executable and script file. The exact method of delivering the VB Script remains unknown.

The malware is open to sale

DarkGate, primarily sold on underground forums by an individual known as RastaFarEye, boasts abilities to slip under the radar of security software, establish persistence through Windows Registry alterations, elevate privileges, and steal data from web browsers as well as applications like Discord and FileZilla.

Infection Chain of Dark Gate.

The malware also establishes communication with a command-and-control (C2) server, enabling actions such as file enumeration, data theft, cryptocurrency mining, remote screenshots, and execution of various commands.

DarkGate is available as a subscription, ranging from $1,000 per day to $15,000 per month and even up to $100,000 annually. The author touts it as the “ultimate tool for pentesters/redteamers” with unparalleled features. Interestingly, previous versions of DarkGate also included a ransomware module.

High Alert! Phishing attacks to be aware of

Phishing attacks remain a primary conduit for distributing stealers, trojans, and malware loaders. Threat actors continually augment these tools with new capabilities to expand their scope.

A recent report by HP Wolf Security highlighted that email remains the top method for delivering malware to endpoints, accounting for 79% of identified threats in the second quarter of 2023.

Cybercriminals’ economic resilience and adaptability are worth noting. They keep us amazed with the best tools used for intrusions. What’s our take to fight back?

author

Anas Hasan

date

August 30, 2023

time

2 years ago

Anas Hassan is a tech geek and cybersecurity enthusiast. He has a vast experience in the field of digital transformation industry. When Anas isn’t blogging, he watches the football games.

Have Your Say!!