#DarkGate

Kyle 🕵️‍♂️💻beardedtechguy@allthingstech.social
2024-12-17

Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware thehackernews.com/2024/12/atta

#DarkGate #Malware #CyberSec

2024-12-17

A new malicious campaign uses impersonation via Microsoft Teams voice phishing (vishing), tricking the victims into downloading AnyDesk for remote access and deploying #DarkGate malware.

socprime.com/blog/darkgate-mal

Banner for the article: DarkGate Malware Attack Detection: Voice Phishing via Microsoft Teams Leads to Malware Distribution
2024-08-30

📬 Keylogger versteckte sich in Erweiterung von Pidgin
#Cyberangriffe #Darkgate #Eset #Jabber #Keylogger #Pidgin sc.tarnkappe.info/b4019a

Jennifer Morency :mastodon:JenMorency@toot.community
2024-08-27

#Malware infiltrates #Pidgin messenger’s official plugin repository bleepingcomputer.com/news/secu I used to use Pidgin to communicate with friends on AIM and similar messenger apps. The malicious plugin was offered only as a binary, not open source code. Worryingly, it had valid signatures, and so did the malware it downloaded. #DarkGate #Jabber #messenger

2024-07-19

DarkGate: Dancing the Samba With Alluring Excel Files
#DarkGate
unit42.paloaltonetworks.com/da

#マルウェア#スイスアーミーナイフ である #DarkGate が、ライバルの Qbot が潰されたことでブームに 」: The Register

「DarkGate マルウェア ファミリは、主な競合他社の 1 つが FBI によって排除された後、ここ数カ月でさらに蔓延しています。
開発者は RastaFarEye という名前で呼ばれるこのソフトウェアは、キーロギングからデータや資格情報の盗難、さらにはリモート アクセスに至るまであらゆる用途に使用でき、 ランサムウェアの展開 に使用される可能性があります。 DarkGate に感染すると、犯罪者はコンピュータを完全に制御できるようになります。」

theregister.com/2024/07/16/dar

#prattohome #TheRegister

2024-06-14

We have new intel regarding a campaign using "PasteJacking" to distribute the DarkGate malware. Nothing like end-users blindly pasting the contents of their clipboard and following malicious instructions - 🤦‍♂️ - We discuss in detail in this episode of The Security Swarm Podcast > buff.ly/3KFnK9w - #cybersecurity #darkgate #secops

2024-06-05

DarkGate switches up its tactics with new payload, email templates
#DarkGate
blog.talosintelligence.com/dar

2024-06-05

How #DarkGate is using new Remote Template Injection techniques to bypass detection blog.talosintelligence.com/dar

🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​H3liumb0y@infosec.exchange
2024-06-04

DarkGate Malware Switches to AutoHotkey for Advanced Evasion Techniques

Date: June 2024
CVE: CVE-2023-36025, CVE-2024-21412
Vulnerability Type: Remote Code Execution, Information Disclosure
CWE: [[CWE-22]], [[CWE-427]]
Sources: McAfee , Trend Micro, The Hacker News

Synopsis

DarkGate malware, known for its stealth and versatility, has recently transitioned from using AutoIt to AutoHotkey for its attack scripts. This shift enhances its evasion capabilities against security software, posing a renewed threat to targeted systems.

Issue Summary

The DarkGate malware has been active since 2018, offering a range of malicious functions including remote access, keylogging, and data theft. In its latest iteration, observed in March 2024, the malware has switched from AutoIt to AutoHotkey scripts to bypass detection mechanisms such as Microsoft Defender SmartScreen. The malware is distributed through phishing emails containing malicious HTML or Excel attachments.

Technical Key Findings

DarkGate initiates its attack via a phishing email, tricking users into opening a malicious HTML or Excel file. This file exploits security flaws in Microsoft Defender SmartScreen, allowing a Visual Basic Script to execute PowerShell commands that launch an AutoHotkey script. This script then downloads and executes the DarkGate payload.

Vulnerable Products

  • Microsoft Windows systems running outdated or unpatched versions of Microsoft Defender SmartScreen
  • Any systems susceptible to phishing attacks via email clients

Impact Assessment

When exploited, DarkGate can provide attackers with full remote access to compromised systems. This includes capabilities for credential theft, keylogging, screen capturing, and installing additional malware, significantly jeopardizing the integrity and security of affected systems.

Patches or Workarounds

N.A.

Tags

#DarkGate #Malware #CVE-2023-36025 #CVE-2024-21412 #AutoHotkey #RemoteAccessTrojan #Phishing #MicrosoftDefender #CyberSecurity #threatintelligence

2024-05-22

Под капотом DarkGate: разбираем ВПО-мультитул

Исследователи кибербезопасности обнаружили вредоносное ПО, которое сочетает в себе функции загрузчика, стилера и RAT. Рассказываем, как оно было разработано, для чего используется и почему применяется в атаках на российские компании вопреки ограничению от разработчика. Читать

habr.com/ru/companies/bizone/a

#darkgate #впо #вредоносное_программное_обеспечение #реверс_инжиниринг #исследование_безопасности #rat #стилер #загрузчик

D3LabD3Lab
2024-05-03

Campagne Week 18

☠️🔥👻💣
: Ordine
: Offerta
: APK Bank
: Modulo
: Offerta
: Ordine
: Photo
: Report

D3LabD3Lab
2024-04-12

Campagne Week 15

👻💣🔥☠️
: Ordine
: Fattura
: APK Bank - INPS
: Contratto
: Documento
: Offerta
: Booking

Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:youranonriots@kolektiva.social
2024-03-25

#DarkGate operators abused Google Ads technology to widen their malicious reach in a zero-day campaign that exploited the Windows Defender SmartScreen bypass vulnerability CVE-2024-21412.
#infosec
Here’s how the attack was
carried out
trendmicro.com/en_us/research/

Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:youranonriots@kolektiva.social
2024-03-20

#DarkGate operators abused Google Ads technology to widen their malicious reach in a zero-day campaign that exploited the Windows Defender SmartScreen bypass vulnerability CVE-2024-21412.

Here’s how the attack was carried out: ⬇️ research.trendmicro.com/4c7tw0

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst