Beware Of Fake WinRar Websites Delivering Ransomware via GitHub


The threat actors often exploit fake websites to trick users into revealing their personal data. Not only that, but these fake websites are also used to distribute malware, steal identities, and facilitate phishing attacks.

Cybersecurity researchers at SonicWall discovered a deceptive WinRar lookalike website that employs typosquatting to distribute malware. 

EHA

This initial infection triggers the download of multiple malicious components from GitHub, including ransomware, cryptomining software, and information-stealing malware.

Are you from SOC and DFIR Teams? Analyse Malware Incidents & get live Access with ANY.RUN -> Get 14 Days Free Access

Fake WinRar Websites Delivering Ransomware

The fraudulent website win-rar[.]co exploits typosquatting to mimic the legitimate win-rar.com. 

Fake website Win-rar.co (Source – SonicWall)

It hosts zx.ps1, a malicious shell script that initiates the download of additional harmful components from GitHub. 

Shell script zx.ps1 hosted on the fake WinRar website (Source – SonicWall)

An investigation of the “encrypthub” GitHub project revealed a repository likely to contain the complete set of files used in this multi-stage malware attack.

Main malware project page hosted on GitHub (Source – SonicWall)

A variety of malware tools is available in the “encrypthub” GitHub repository, which last week was updated to include:-

  • Windows Defender exclusions
  • HVNC with ngrok
  • Ransomware
  • Cryptominer
  • Kematian Stealer
  • Telegram reporting
  • Shellcode injection
  • A coordinating script

Every component will start by sending system information to a Telegram account.

However, no attacks involving all these components at once have been detected, but rather this store of weaponry represents the ability of threat actors for complex multi-stage intrusions.

This further connects the GitHub project to the typosquatting campaign by having shellcode.ps1, which mimics zx.ps1 on win-rar[.]co. To mitigate such threats, users are strongly advised to exercise caution during installations and verify software sources.

Download Free Cybersecurity Planning Checklist for SME Leaders (PDF) – Free Download



Source link