Researchers Warn of Cyber Criminals Utilizing Go-based Aurora Stealer Malware

A nascent Go-based malware generally known as Aurora Stealer is being more and more deployed as a part of campaigns designed to steal delicate info from compromised hosts.

“These an infection chains leveraged phishing pages impersonating obtain pages of professional software program, together with cryptocurrency wallets or distant entry instruments, and the 911 technique making use of YouTube movies and Search engine optimisation-poised faux cracked software program obtain web sites,” cybersecurity agency SEKOIA mentioned.

First marketed on Russian cybercrime boards in April 2022, Aurora was supplied as a commodity malware for different menace actors, describing it as a “multi-purpose botnet with stealing, downloading and distant entry capabilities.”

Within the intervening months, the malware has been scaled right down to a stealer that may harvest recordsdata of curiosity, knowledge from 40 cryptocurrency wallets, and functions like Telegram.

Aurora additionally comes with a loader that may deploy a next-stage payloading utilizing a PowerShell command.

Aurora Stealer Malware

The cybersecurity firm mentioned a minimum of totally different cybercrime teams, known as traffers, who’re chargeable for redirecting person’s site visitors to malicious content material operated by different actors, have added Aurora to their toolset, both completely or alongside RedLine and Raccoon.

“Aurora is one other infostealer focusing on knowledge from browsers, cryptocurrency wallets, native methods, and performing as a loader,” SEKOIA mentioned. “Offered at a excessive value on market locations, collected knowledge is of specific curiosity to cybercriminals, permitting them to hold out follow-up profitable campaigns, together with Massive Sport Looking operations.”

The event additionally comes as researchers from Palo Alto Networks Unit 42 detailed an enhanced model of one other stealer known as Typhon Stealer.

The brand new variant, dubbed Typhon Reborn, is designed to steal from cryptocurrency wallets, net browsers, and different system knowledge, whereas eradicating beforehand present options like keylogging and cryptocurrency mining in a possible try to attenuate detection.

“Typhon Stealer offered menace actors with a straightforward to make use of, configurable builder for rent,” Unit 42 researchers Riley Porter and Uday Pratap Singh mentioned.

“Typhon Reborn’s new anti-analysis strategies are evolving alongside trade strains, changing into more practical within the evasion techniques whereas broadening their toolset for stealing sufferer knowledge.”

Latest articles

Related articles

Leave a reply

Please enter your comment!
Please enter your name here