Monday , January 27 2025
Ducktail malware family

Kaspersky reveals report
Indian marketers targeted by Delphi-powered malware linked with Vietnam

Vietnamese hackers behind the Ducktail stealer malware recently carried out a new campaign from March to early October 2023. They specifically targeted marketing professionals in India in order to take over Facebook business accounts.

“An important feature that sets it apart is that, unlike previous campaigns, which relied on .NET applications, this one used Delphi as the programming language,” Kaspersky said in a report published last week.

UnitedHealth confirms 190 million impacted by 2024 data breach

UnitedHealth confirmed that the ransomware attack on its Change Healthcare unit last February impacted about 190 million Americans, nearly double...
Read More
UnitedHealth confirms 190 million impacted by 2024 data breach

Registration Open For BCS CTF 2025

So, to test your cyber security skill, here is another chance to do that. Bangladesh computer society (BCS) is going...
Read More
Registration Open For BCS CTF 2025

New Ransomware Tactics Target VMware ESXi Via SSH Tunneling

Sygnia's recent report highlights the changing strategies of ransomware groups targeting VMware ESXi appliances. These attackers exploit vital virtual infrastructure...
Read More
New Ransomware Tactics Target VMware ESXi Via SSH Tunneling

Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass

An exhaustive evaluation of three firewall models from Palo Alto Networks has uncovered a host of known security flaws impacting...
Read More
Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass

CISA Releases 6 ICS Advisories Detailing Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released 6 advisories for Industrial Control Systems (ICS), highlighting vulnerabilities in various...
Read More
CISA Releases 6 ICS Advisories Detailing Security Issues

Account Credentials for Security Vendors Found on Dark Web: Cyble Report

# "While many leaked security credentials belong to customers, some exposed sensitive accounts suggest that security vendors too have been...
Read More
Account Credentials for Security Vendors Found on Dark Web: Cyble Report

Four Critical Ivanti CSA Vulnerabilities Exploited: CISA , FBI warns

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have released a joint Cybersecurity Advisory...
Read More
Four Critical Ivanti CSA Vulnerabilities Exploited: CISA , FBI warns

GitLab Releases Patch (CVE-2025-0314) for XSS Exploit

GitLab has released update for high severity cross-site scripting (XSS) flaw. Versions 17.8.1, 17.7.3, and 17.6.4 for both Community Edition...
Read More
GitLab Releases Patch  (CVE-2025-0314) for XSS Exploit

CVE-2025-20156
Cisco Fixes Meeting Management Allowing Privilege Escalation

Cisco has released a security advisory concerning a critical privilege escalation vulnerability (CVE-2025-20156) in its Meeting Management software. With a...
Read More
CVE-2025-20156  Cisco Fixes Meeting Management Allowing Privilege Escalation

Delay patching leaves about 50,000 Fortinet firewalls to zero-day attack

Fortinet customers must apply the latest updates, as almost 50,000 management interfaces remain vulnerable to the latest zero-day exploit. The...
Read More
Delay patching leaves about 50,000 Fortinet firewalls to zero-day attack

Ducktail, Duckport, and NodeStealer are cybercrime groups in Vietnam. They use sponsored ads on Facebook to spread malicious ads and deploy malware. This malware steals login cookies and allows them to control victims’ accounts.

These attacks mainly target users who have access to a Facebook Business account. The attackers gain unauthorized access and use it to place advertisements for their own financial benefit, spreading the infections even more.

ALSO READ:

Juniper Patches Over 30 Vulnerabilities in Junos OS

A Russian cybersecurity company has documented a campaign where individuals seeking a career change are sent archive files. These files contain a harmful executable file disguised with a PDF icon. The intention is to deceive the targets into opening the binary file.

Doing so results in the malicious file saving a PowerShell script named param.ps1 and a decoy PDF document locally to the “C:\Users\Public” folder in Windows.

“The script uses the default PDF viewer on the device to open the decoy, pauses for five minutes, and then terminates the Chrome browser process,” Kaspersky said.

The parent executable also downloads and launches a rogue library named libEGL.dll, which scans the “C:\ProgramData\Microsoft\Windows\Start Menu\Programs” and “C:\ProgramData\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\” folders for any shortcut (i.e., LNK file) to a Chromium-based web browser.

        Malicious file usage flowchart (Securelist)

To proceed, you need to modify the browser’s LNK shortcut file. Add the “–load-extension” command line switch to launch a deceptive extension that pretends to be the real Google Docs Offline add-on in order to remain undetected.

The extension is designed to send information about open tabs to a server controlled by an actor in Vietnam. It is used to hijack Facebook business accounts.

Source: Securelist by Kaspersky

Check Also

Linux

126 Linux kernel Vulns Allow Attackers Exploit 78 Linux Sub-Systems

Ubuntu 22.04 LTS users are advised to update their systems right away due to a …

Leave a Reply

Your email address will not be published. Required fields are marked *