Hackers Target Software Cracks And BitTorrent Client To Steal Browser Data And Cryptocurrency

Researchers from cybersecurity company Bitdefender have warned that hackers are actively exploiting software cracks in pirated versions of Microsoft Office and Adobe Photoshop CC to empty peopleโ€™s cryptocurrency wallets.

Bitdefender analysts recently uncovered a series of attacks that leverage office tools and image-editing software cracks to compromise computers, hijack crypto-currency wallets, and exfiltrate information via the TOR network.

โ€œOnce executed, the crack drops an instance of ncat.exe (a legitimate tool to send raw data over the network) as well as a TOR proxy,โ€ said Bitdefender’s Bogdan Botezatu, Director of Threat Research and Reporting and Security Researcher Eduard Budaca in aย blog post.

These files are placed in the system storage identified asย โ€˜%syswow64%-nap.exeโ€™ย orย โ€˜%syswow64%-ndc.exeโ€™, andย โ€˜%syswow64-tarsrv.exeโ€™. A batch file is also placed atย โ€˜%syswow64%-chknap.batโ€™ย which contains a command line for the Ncat component dedicated to traversing ports 8000 and 9000 in .onion domains as shown below.

These tools work together to create a powerful backdoor that communicates through TOR with its command and control center: the ncat binary uses the listening port of the TOR proxy (`โ€“proxy 127.0.0.1:9075`) and uses the standard โ€˜โ€“execโ€™ parameter, which allows all input from the client to be sent to the application and responses to be sent back to the client over the socket (reverse shell behavior).

The crack also creates persistence mechanisms for the TOR proxy file and the Ncat binary on the compromised machine with a service and a scheduled task that runs every 45 minutes.

According to Bitdefenderโ€™s investigation, the backdoor is most likely being used interactively by a human operator rather than sending automated requests to the victims. Some of the actions that were observed by the researchers are:

  • File exfiltration
  • BitTorrent client execution to exfiltrate data
  • Disabling the firewall in preparation for data exfiltration
  • Stealing of Firefox browser profile data (history, credentials, and session cookies). Before exfiltration, attackers archive the profile folder with 7zip to generate one file that contains everything.
  • Theft of the Monero wallet via the legitimate CLI client โ€˜monero-wallet-cli.exeโ€™.

The above list of actions is non-exhaustive, as attackers have complete control of the system and can adapt campaigns based on their current interests.

As per Bitdefender, these types of malware-loaded cracks mostly affect people who download files from websites that have little or no control.

โ€œThese cracks are usually hosted on direct-download websites rather than on torrent portals, as the latter have a community that downvotes and flags malicious uploads,โ€ Botezatu told TF.

Currently, distribution of these cracks are mostly found in the United States, India, Canada, Greece, Germany, Italy, Spain, South Africa, and the United Kingdom. For more information about the files and processes involved, you can read Bitdefenderโ€™s complete write-up here.

Kavita Iyer
Kavita Iyerhttps://www.techworm.net
An individual, optimist, homemaker, foodie, a die hard cricket fan and most importantly one who believes in Being Human!!!

Subscribe to our newsletter

To be updated with all the latest news

Read More

Suggested Post