Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Top Malware Loaders Can Really Load The Headaches
Facebook   X   LinkedIn   Email

Top Malware Loaders Can Really Load The Headaches

January 6, 2024

Malware loaders are some of the most challenging security concerns. They are also some of the most common tools that threat actors use to gain initial access to a network, through which they can deliver and run other kinds of malware. These include trojans, ransomware, viruses, or worms. Unfortunately, mitigating one of them might not work for another, even if the loaded malware is the same. This makes them a major headache for IT departments and you.

Researchers at ReliaQuest, a managed security provider, found out that 80% of the total cybersecurity incidents tracked in the first 7 months of 2023 involved three malware loaders: QakBot, Raspberry Robin, and SocGholish. But what is known about these top 3 malware loaders?

1. QakBot started as a banking trojan and has quickly evolved to add more functionality. Beyond network entry, it can:

  • Enable remote execution
  • Spread payloads
  • Aid lateral movement
  • Steal data

The malware is linked to the Black Basta ransomware group. Once the malware successfully infiltrates a target system, it can steal data, maintain control over the compromised device, or facilitate further attacks.

2. SocGholish is a Javascript-based loader designed to target entities or users on Windows OS. It spreads via drive-by downloads on compromised sites, usually by fooling visitors with Adobe Flash and Microsoft Teams updates. This means, you merely have to land on a malicious web page, even if by accident, to download this.

The malware is linked to the Russian-based “Evil Corp,” which mainly targets U.S. industries such as retail, legal services, and food services and accommodation. With a few clicks, SocGholish can affect entire networks or domains, and it has aggressively launched numerous watering hole attacks in 2023.

3. Raspberry Robin is one elusive loader that also targets users on the Windows OS. It typically spreads via USB devices. It leverages several techniques to hide, including code injection and creating scheduled tasks.

Raspberry Robin has been used to deliver a number of ransomware and other forms of malware including “LockBit,” “Cl0p,” “Flawed Grace,” and “TrueBot,” not to mention the Cobalt Strike tool. Its operators have targeted government, telecommunications, financial institutions, and manufacturing organizations in 2023.

With all malware, phishing is the typical way it makes it onto any system. So always take a minute to make sure you’re not setting anything loose on your device or network. Check for typos and grammatical errors and don’t click links that are not trustworthy. In addition, because some of them can execute merely by you landing on their web pages, be sure the address you’re typing into your browser's address bar is correct and that you haven’t made any typos.

Of course, never access a USB stick that may have one of these on it, and don’t leave your devices unattended or unlocked when you leave them. It only takes a few seconds for someone to put malware on them.


Government Agencies Issue Warning About Plugging In

Your Security

Government Agencies Issue Warning About Plugging In

The FBI and the FCC recently issued a warning about something many of us do all the time. We plug our mobile devices in USB slots to charge them while on the go. In today's world, charging stations for mobile devices are found almost everywhere. From bars to airports, and even ride-sharing vehicles, these charging stations are often offered as a courtesy by their owners. However, it is important to exercise caution when using these stations to avoid becoming a victim of "juice-jacking." READ FULL STORY

Do Zero-Day Vulnerabilities Really Get Exploited Or Are You Just Scaring Us?

Corporate Security

Do Zero-Day Vulnerabilities Really Get Exploited Or Are You Just Scaring Us?

Sometimes we hear about an exploit that could cause potential harm to an individual or company and push it aside and perhaps briefly wonder if it ever actually did cause harm. If you have been paying attention to the technology news at all in the past weeks, you will know that they do indeed get exploited. One group is really busy and has made headlines a few times lately. In fact, every day there is a new story about an organization that has been attacked using the MOVEit zero-day. But no doubt, the other vulnerabilities are being abused too. READ FULL STORY

Check Point Research Reveals Threats Making a Menace of Themselves in 2023

Your Security

Check Point Research Reveals Threats Making a Menace of Themselves in 2023

Have you heard enough of the Trojan Qbot? Well, that sneaky bot is not going away, nor is it sitting back and being quiet. In fact, per a report by Check Point Research, it’s been hanging around making a cybersecurity menace of itself all throughout the year, thus far. It’s not the only malicious news for the year either. The mobile Trojan SpinOk made its debut and that pesky MOVEit zero-day vulnerability has not moved an inch to stay out of the news. READ FULL STORY

Top Ransoware Groups Wreak Havoc Since 2020; Tips To Keep Ransomware At Bay

Scams & Phishing

Top Ransoware Groups Wreak Havoc Since 2020; Tips To Keep Ransomware At Bay

There are many ransomware groups lurking in the shadows these days. They may come out from time to time, hold a few businesses for ransom and then slink back into the abyss. Later, they may reappear and do it again. Some disappear but under a different name and others morph into a new group. One thing that stays consistent is that they are always there. Included here is some information on them and what you can do to combat their tactics. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...