Share this article

Latest news

With KB5043178 to Release Preview Channel, Microsoft advises Windows 11 users to plug in when the battery is low

Copilot in Outlook will generate personalized themes for you to customize the app

Microsoft will raise the price of its 365 Suite to include AI capabilities

Death Stranding Director’s Cut is now Xbox X|S at a huge discount

Outlook will let users create custom account icons so they can tell their accounts apart easier

CoralRaider abuses a CDN cache to spread information-stealing malware

Researchers at Cisco Talos exposed them

3 min. read

Published onApril 24, 2024

published onApril 24, 2024

Share this article

Read our disclosure page to find out how can you help Windows Report sustain the editorial teamRead more

Researchers have found a new threat actor who is using a content delivery network (CDN) cache to spread information-stealing malware as part of an ongoing campaign targeting systems in the UK, Germany, the US, and Japan.

According to Cisco Talos, CoralRaider is identified as the threat actor behind it based on similarities in techniques, tactics, and procedures with past attacks. It focuses on stealing credentials, social media accounts, and financial data.

The hackers distribute Cryptbot, Rhadamanthys, and LummaC2 info stealers that are accessible from underground forums from malware-as-a-service platforms for a subscription fee.

How does the attack happen?

The attack chain starts with victims opening an archive consisting of a malicious Windows shortcut file (.LNK). Meanwhile, the delivery method of the archive is not clear, but it could be easily sent through emails, malvertising, or downloads from untrusted sources.

Once executed, the .LNK file sets off the PowerShell commands, which in turn download and execute a heavily obfuscated HTML Application (HTA) file from an attacker-controlled subdomain on the Bynny CDN platform

By using the CDN cache for malware delivery, the threat actor focuses on bypassing network defense and preventing request delays.

The HTA file comprises JavaScript that decodes and runs the PowerShell decrypter script, which then unpacks the second script, which writes a batch script in a temp folder to make changes to the Windows Defender exclusions.

Furthermore, the FoDHelper.exe LoLBin is used to modify registry keys and circumvent User Access Control (UAC) security features.

After this, the PowerShell script downloads and runs one of three information stealers: Cryptbot, LummaC2, or Rhadamanthy, which are already added in locations excluded from Defender’s scanning.

CoralRaider usually uses the latest versions of Rhadamanthys and LummaC2, which are popular because of their advanced features, like reviving expired Google account cookies and capturing RDP logins.

However, in some recent attacks, the latest variant of Cryptbot, released in January, was used. It has enhanced obfuscation, anti-analysis mechanisms, and an expanded list of targeted apps.

Cisco Talos also mentioned that Cryptbot aims at databases for password managers and authenticator app data, with the notion of stealing cryptocurrency wallets protected with two-factor authentication.

CoralRaider has been active since 2023, and according to researchers, it is based in Vietnam. Its primary victims are from Asian and Southeast Asian countries. However, its operations have expanded and victimized users in other regions, including the US, Pakistan, Nigeria, and more.

The researchers have tried to track and reduce CoralRaider’s activities. The threat actor has been evolving its tactics and expanding its reach, but it still poses a significant threat to individuals and companies globally.

What are your thoughts on the matter? Share your opinions with our readers in the comments section below.

More about the topics:malware

Srishti Sisodia

Windows Software Expert

Srishti Sisodia is an electronics engineer and writer with a passion for technology. She has extensive experience exploring the latest technological advancements and sharing her insights through informative blogs.

Her diverse interests bring a unique perspective to her work, and she approaches everything with commitment, enthusiasm, and a willingness to learn. That’s why she’s part of Windows Report’s Reviewers team, always willing to share the real-life experience with any software or hardware product. She’s also specialized in Azure, cloud computing, and AI.

User forum

0 messages

Sort by:LatestOldestMost Votes

Comment*

Name*

Email*

Commenting as.Not you?

Save information for future comments

Comment

Δ

Srishti Sisodia

Windows Software Expert

She is an electronics engineer and writer with a passion for technology. Srishti is specialized in Azure, cloud computing, and AI.