Press ESC to close

EyeSpy – Iranian Spyware Delivered in VPN Installers

CategoryDetails
Threat ActorsCybercriminals using Trojanized VPN installers to deliver the SecondEye spyware, developed in Iran.
Campaign OverviewA malware campaign distributing SecondEye spyware via trojanized installers of the 20Speed VPN, developed in Iran. The campaign targets users of the VPN, primarily in Iran, with some victims in Germany and the US.
Target Regions (Victims)Mainly Iran, with smaller victim pools in Germany and the US.
Methodology– Trojanized VPN installers used to deliver SecondEye spyware.
– Spyware includes keylogging and stealing sensitive data like passwords, images, and crypto-wallets.
– Delivered via malicious .bat and .exe files.
Product Targeted20Speed VPN (Iranian-based VPN service).
Malware ReferenceSecondEye spyware, also referred to as EyeSpy in the context of the attack.
Tools UsedTrojanized VPN installer, SecondEye spyware components (keylogging, stealing documents, passwords, and crypto-wallets).
Vulnerabilities ExploitedUse of legitimate software (VPN) to distribute malicious payloads.
TTPs– Use of trojanized legitimate software installers (VPN).
– Data theft via keylogging and stealing sensitive information.
AttributionThe malware is associated with Iranian-developed spyware, distributed via Iranian VPN software.
Recommendations– Be cautious when downloading VPN software, especially from unknown or untrusted sources.
– Use reputable security software to detect and prevent keyloggers and spyware.
SourceBitdefender

Read full article : https://www.bitdefender.com/en-us/blog/labs/eyespy-iranian-spyware-delivered-in-vpn-installers

Disclaimer: The above summary has been generated by an AI language model

Leave a Reply

Your email address will not be published. Required fields are marked *