Cybersecurity Alert: New BunnyLoader Malware Threat 🐰

Oct 03 2023

Gone Phishing Banner

Welcome to Gone Phishing, your daily cybersecurity newsletter that’s shone a light on cybercrime #HS2 many times, too many times blud πŸ˜‚

Today’s hottest cybersecurity news stories:

  • 🐰 BunnyLoader: No MaaS, por favor! Malware-as-a-Service appears πŸ‘¨β€πŸ’»

  • πŸ”‘ Bim bimmer who’s got the keys to my Silent Skimmer. Watch out! πŸ‘€

  • πŸ’… Don’t SaaS me! LUCR-3: Scattered Spider spinning webs in the cloud ☁️

New malware will leave you hoppin’ mad 🐰

 

giphy.com

 

πŸ”’ Cybersecurity Alert: New BunnyLoader Malware Threat 🐰

Hey there, cyber warriors! πŸ‘©β€πŸ’»πŸ‘¨β€πŸ’» Brace yourselves for a new malware-as-a-service (MaaS) threat on the cybercrime scene. It’s called BunnyLoader 🐰, and it’s causing quite a buzz among cyber experts. 😱

πŸ“Œ What’s BunnyLoader?

BunnyLoader is a sneaky piece of software that can do some nasty things. It can download and execute dangerous payloads, steal your browser credentials and system info, run remote commands on your computer, capture keystrokes, and even mess with your clipboard to swap cryptocurrency wallet addresses! πŸ’»πŸ’°

πŸ’² Price Tag: $250 for a Lifetime License

For just $250, you can get BunnyLoader’s lifetime licence. It’s been evolving since its debut on September 4, 2023, with new tricks up its sleeve, including anti-sandbox and antivirus evasion techniques. πŸ’Ό

πŸ”§ What’s New in the Updates?

Recent updates fixed critical issues like command-and-control problems and SQL injection flaws. BunnyLoader’s author, PLAYER_BUNNY (aka PLAYER_BL), boasts about its fileless loading feature that gives antivirus programs a run for their money. πŸ¦ πŸ”

πŸ“ˆ BunnyLoader’s Features:

  • Monitors active tasks

  • Tracks infection stats

  • Controls compromised machines

  • Steals data like a pro πŸ“ŠπŸ•΅οΈ

πŸ€” How Does It Spread?

We’re not entirely sure how BunnyLoader spreads initially, but once it’s in, it plays dirty. It sets up shop in your Windows Registry, checks for sandboxes, and gets to work. It can download more malware, snoop on your keystrokes, and redirect cryptocurrency payments! πŸ˜ˆπŸ’°

🚨 Malware-as-a-Service Threat

BunnyLoader is a constantly evolving threat. Experts warn it’s getting smarter with each update, making it harder to detect. 🚫🦠

Stay vigilant, folks! Make sure your cybersecurity defences are up to date to fend off this fluffy but dangerous BunnyLoader and other lurking threats in the digital wilderness. πŸ›‘οΈπŸŒ

 

Clean your Mac or PC

 

Cybersecurity is more important than ever, and your Mac or PC are no exception. Over time, your Mac or PC can accumulate junk files, malware, and other threats that can slow it down and make it vulnerable to attack.

That’s where MacPaw comes in. MacPaw offers a suite of easy-to-use apps that can help you clean, optimize, and secure your Mac. With MacPaw, you can:

  • Remove junk files and malware to free up space and improve performance

  • Protect your privacy by erasing sensitive data

  • Optimize your startup settings to speed up boot times

  • Manage your extensions and apps to keep your Mac or PC running smoothly

Since 2008 MacPaw is trusted by over 30 million users worldwide, and it’s the perfect solution for keeping your Mac or PC safe and secure.

Silent but violent πŸ’€

πŸŒπŸ’³ Cyber Threat Alert: Silent Skimmer Strikes Online Payment Businesses πŸ’°πŸ“Š

Hey, vigilant netizens! πŸ›‘οΈ Keep your wallets safe because a financial cyber campaign called Silent Skimmer has been quietly targeting online payment businesses across Asia Pacific, North America, and Latin America for over a year. 🎯

πŸ•΅οΈβ€β™‚οΈ Who’s Behind It?

The BlackBerry Research and Intelligence Team is on the case, tracing this threat back to a skilled actor fluent in Chinese. They’ve been going after online businesses and point-of-sale (PoS) service providers. πŸ’ΌπŸ’»

🎯 How Do They Operate?

These cybercriminals exploit vulnerabilities in web applications, especially those using Internet Information Services (IIS). Their main goal? To compromise payment checkout pages and steal your sensitive payment data. πŸ˜±πŸ’»πŸ’³

πŸš€ The Attack Chain:

Once they sneak in, they use open-source tools and clever techniques for privilege escalation and code execution. This leads to a PowerShell-based remote access trojan that lets them control the host. It connects to a remote server for more tools, like download scripts and Cobalt Strike beacons. πŸ¦ πŸ’»πŸŒ

πŸ’£ What’s the Endgame?

Their ultimate aim is to infiltrate web servers and drop a scraper in the payment checkout service. This sneaky tool quietly snatches your financial info while you innocently enter it on a webpage. πŸ˜ˆπŸ•΅οΈβ€β™€οΈ

🌐 Geolocation Trickery

These cyber crooks choose virtual private servers (VPS) based on their victims’ locations to dodge detection. πŸŒπŸ“

πŸ€” Opportunistic Approach

Silent Skimmer goes after various industries and regions, suggesting it’s more about seizing opportunities than having a specific plan. πŸŒŽπŸ’Ό

Stay alert, and make sure you’re practising safe online shopping. These cyber threats are lurking everywhere! πŸš«πŸ¦ πŸ’»

In other news, watch out for scams on dating apps like MeetMe, where crooks are making millions with fake cryptocurrency schemes. Be cautious and stay safe online! πŸš¨πŸ’”πŸ“²

πŸ—žοΈ Extra, Extra! Read all about it!

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • πŸ’ŠΒ HealthHack:Β Tech is making it easier than ever to reach your fitness goals, from wearable devices to nutrition apps, this newsletter does the research for you, get all the latest health tech gadgets delivered to your inbox.

  • β‚Ώ Crypto Nutshell: A well written and beautifully designed newsletter giving you the lowdown on crypto and web3, highly recommend if interested to get up to date info on the crypto/web3 market.

  • 🧠 Big Brain: Trending AI news, jobs and tools delivered in 3 minutes per day.

Let us know what you think!

My Spidey sense is tingling πŸ•·οΈπŸ‘€

Spider-Man Marvel GIF by Spider-Man: Across The Spider-Verse

 

Gif by SpiderVerseMovie on Giphy

 

🚨 Cyber Threat Alert: Meet “LUCR-3” πŸ’ΌπŸ’»

Heads up, folks! There’s a new financially motivated attacker on the block, and it goes by the name LUCR-3. This cybercriminal is skilled and has been targeting Fortune 2000 companies across sectors like Software, Retail, Hospitality, Manufacturing, and Telecoms. πŸ˜±πŸ’°

πŸ“Œ How LUCR-3 Operates

LUCR-3 doesn’t rely heavily on malware or scripts. Instead, it’s a pro at using your own tools and resources against you. It sneaks into your systems through Identity Providers (IDP) like Okta, Azure AD, and Ping Identity, aiming to steal Intellectual Property (IP) for extortion.

They don’t just stop there; they also target your SaaS applications, learning how your organisation works and snatching sensitive data, including IP, Code Signing Certificates, and customer data. πŸ•΅οΈβ€β™‚οΈπŸ”’

🌐 Attribution Challenge

Identifying LUCR-3 isn’t easy. The cyber intelligence community has been tracking various personas linked to it. Some even seem to have connections to the BlackCat ransomware. 😬

βš”οΈ Weapon of Choice

LUCR-3 uses web browsers and GUI utilities for its mission, especially in Cloud, SaaS, and CI/CD environments. It operates like a savvy employee, making it hard to detect. πŸ•΅οΈβ€β™€οΈπŸ’»

πŸ’Ό LUCR-3’s Mission

Financial gain is the name of the game for LUCR-3. They steal sensitive data like IP and customer info to attempt extortion, often demanding millions of dollars. Some LUCR-3 personas even team up with ALPHV for the extortion phase. πŸ’ΈπŸ€―

πŸ”§ Toolset

LUCR-3 prefers Windows 10 systems with GUI utilities. In AWS, they leverage the S3 Browser and AWS Cloudshell. They’re pros at using APIs, access tokens, and more to navigate your systems without raising alarms. πŸ§°πŸš€

🎯 Victimology

LUCR-3 often targets big organisations with valuable IP, especially software companies. They also go after Identity Providers and their outsourced services. Recently, they’ve expanded their scope to include sectors like hospitality, gaming, and retail. 🏒🎯

πŸ”„ Attack Lifecycle

LUCR-3 does its homework, carefully choosing victims with the right access. They gain initial access through compromised credentials, bypass MFA, and modify MFA settings. Then, they reconstruct your environment, escalate privileges if needed, and establish persistence. The goal is to maintain their presence and evade detection through various defence evasion tactics. Finally, they complete their mission by stealing sensitive data. πŸ”„πŸŽ―

Stay vigilant, strengthen your defences, and be cautious of suspicious activity, especially in your cloud and SaaS environments. Cyber threats like LUCR-3 are always on the prowl. πŸ›‘οΈπŸŒ

So long and thanks for reading all the phish!

Recent articles