Press ESC to close

‘SteelFox’ Malware Blitz Infects 11K Victims With Bundle of Pain

CategoryDetails
Threat ActorsUnidentified; deploying the SteelFox malware campaign.
Campaign OverviewActive since February 2023, SteelFox is a mass-targeting data-stealing and cryptomining campaign infecting over 11,000 users globally via fraudulent activators for applications like AutoCAD, JetBrains, and Foxit PDF Editor.
Target RegionsBrazil, China, Russia, Mexico, UAE, and others.
MethodologyDistributed through forum posts and torrents posing as software activators. Executes encrypted payloads, modifies system files, and evades detection with SSL pinning, TLSv1.3 encryption, and persistent Windows services.
Product TargetedAutoCAD, JetBrains, Foxit PDF Editor, and other applications targeted through fraudulent activators.
Malware ReferenceSteelFox: Includes data stealer and XMRig cryptominer with hardcoded mining pool credentials.
Tools Used– Sophisticated execution chain
– SSL pinning and TLSv1.3 encryption
– Windows services for persistence
– Modified PE64 payload with random junk data for obfuscation.
Vulnerabilities ExploitedNot linked to specific CVEs but leverages users’ trust in illegal activators for initial access.
TTPs– Initial Access (T1195): Malicious activator delivery.
– Defense Evasion (T1070): Encrypted payloads, modified timestamps, and junk data.
– Credential Dumping (T1003): Browser and network information theft.
AttributionNo definitive attribution, but behaviors align with sophisticated cybercriminal operations.
Recommendations– Avoid pirated software or illegal activators.
– Use endpoint detection and response (EDR) solutions.
– Monitor TLS traffic for anomalies.
– Strengthen user education on software sourcing risks.
– Regular patching.
SourceDarkreading

Read full article: ‘SteelFox’ Malware Blitz Infects 11K Victims
Disclaimer: The above summary has been generated by an AI language model.

Leave a Reply

Your email address will not be published. Required fields are marked *