VenomRAT Malware Introduces New Tools for Password Theft and Stealthy Access

VenomRAT Malware Introduces New Tools for Password Theft and Stealthy Access

A malicious cyber campaign leveraging VenomRAT, a potent Remote Access Trojan (RAT), has been uncovered, posing a significant threat to unsuspecting users through a deceptive website mimicking Bitdefender’s Antivirus for Windows download page.

The fraudulent domain, “bitdefender-download[.]com,” lures victims with a spoofed interface titled “DOWNLOAD FOR WINDOWS,” closely resembling the legitimate site but with subtle discrepancies, such as the omission of the word “free.”

Malicious domain

Clicking the download button triggers the retrieval of a malicious file, “BitDefender.zip,” hosted on a Bitbucket URL that redirects to an Amazon S3 source.

– Advertisement –
Google News

This archive contains “StoreInstaller.exe,” which embeds configurations for VenomRAT alongside code from open-source tools SilentTrinity and StormKitty, forming a lethal triad of malware designed for infiltration, theft, and persistence.

Targets Users with Fake Bitdefender Site

VenomRAT, a fork of the open-source Quasar RAT, serves as the backbone of this operation, facilitating initial access and sustained control over compromised systems with capabilities like remote access, keylogging, and data exfiltration.

StormKitty, a credential stealer, rapidly harvests passwords and cryptocurrency wallet information, while SilentTrinity ensures stealthy, long-term access for potential repeated exploitation or monetization through access sales.

Analysis revealed consistent VenomRAT command-and-control (C2) infrastructure, notably reusing the IP and port combination 67.217.228[.]160:4449 across multiple samples, alongside other IPs like 172.93.222[.]102:4449 and 185.208.159[.]121:6000.

This reuse, coupled with identifiable configurations like a Shodan hash (-971903248) for a 3389 service, enabled researchers to pivot to additional related infrastructure, confirming the actor’s broad operational footprint.

Modular Malware Arsenal for Financial Exploitation

The campaign extends beyond this fake Bitdefender site, with delivery mechanisms including malicious executables hosted on GitHub and other phishing domains spoofing financial institutions like IDBank and Royal Bank of Canada, as well as generic IT services, all aimed at credential theft.

This attack exemplifies the growing trend of modular malware built from open-source components, allowing cybercriminals to craft efficient, adaptable threats.

The combination of VenomRAT’s access capabilities, StormKitty’s rapid harvesting, and SilentTrinity’s covert persistence highlights a dual intent: immediate financial gain through stolen credentials and long-term system compromise.

Infrastructure overlaps, such as Cloudflare-hosted name servers and TLS certificates, link the spoofed Bitdefender domain to other phishing traps like “idram-secure[.]live” and “royalbanksecure[.]online,” revealing a coordinated effort to target a wide range of users.

For everyday internet users, the risk is stark clicking on what appears to be trusted software can unleash a cascade of malware, directly threatening personal finances through compromised bank accounts and digital wallets.

Vigilance is critical: always verify website URLs before downloading software or entering credentials, avoid suspicious links, and maintain robust cybersecurity practices to mitigate these evolving threats.

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!


Source link