Malware & RansomwareHIGH

Malware Campaign - Fake Software Installers Deliver RATs

Featured image for Malware Campaign - Fake Software Installers Deliver RATs
#RAT#Monero#PureRAT#CNB Bot#XMRig

Original Reporting

CSCyber Security News·Tushar Subhra Dutta

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk — action recommended within 24-48 hours

🦠
🦠 MALWARE PROFILE
Malware NameCNB Bot, PureRAT, PureMiner
Malware TypeRemote Access Trojan, Cryptocurrency Miner
Threat ActorREF1695
Target PlatformWindows
Delivery MethodFake Software Installers
Persistence MechanismScheduled Tasks
C2 InfrastructureOverlapping C2 servers
CapabilitiesData exfiltration, Cryptocurrency mining
IOCs AvailableMalware hashes, C2 IPs
Detection Rate
MITRE ATT&CKT1071.001 (Application Layer Protocol: Web Protocols)
🎯

Basically, fake software tricks users into installing malware that steals resources and money.

Quick Summary

A malware campaign tricks users into downloading fake software installers that deliver RATs and Monero miners. This long-running operation has earned the attacker significant revenue. Stay vigilant to avoid falling victim to such scams.

What Happened

A financially motivated threat actor has been running a malware campaign since late 2023. This operation, designated REF1695, tricks users into downloading fake software installers. These installers secretly deliver remote access trojans (RATs) and Monero cryptocurrency miners. The campaign has remained active for over two years, steadily expanding its toolset while staying under the radar.

How It Works

The campaign presents victims with a realistic software installation experience. Users see a progress bar or a fake error message, which distracts them while the malware is installed. Researchers from Elastic Security Labs traced the operation back to November 2023, identifying four distinct campaign variants, each deploying different malicious tools like PureRAT, CNB Bot, and PureMiner.

Who's Being Targeted

The campaign targets unsuspecting users looking for software. Victims are often redirected to fake registration pages that push them into completing online surveys or signing up for services, allowing the attacker to earn commissions.

Signs of Infection

Victims may notice unusual CPU usage, unknown scheduled tasks, or unexpected network activity. The malware operates discreetly, often shutting down when it detects security tools running on the infected system.

How to Protect Yourself

To stay safe, users should:

  • Only download software from official sources.
  • Avoid running unsigned executables.
  • Keep antivirus solutions updated.
  • Investigate unusual system behavior immediately.

Conclusion

This malware campaign highlights the importance of vigilance when downloading software. Users must remain cautious and informed to avoid falling victim to such deceptive tactics.

🔍 How to Check If You're Affected

  1. 1.Check for unusual CPU usage or unknown scheduled tasks.
  2. 2.Investigate any unexpected network activity.
  3. 3.Ensure antivirus software is up to date and running.

🏢 Impacted Sectors

All Sectors

Pro Insight

🔒 Pro insight: The REF1695 campaign exemplifies the evolving tactics of financially motivated actors leveraging social engineering to deploy malware.

Sources

Original Report

CSCyber Security News· Tushar Subhra Dutta
Read Original

Related Pings

HIGHMalware & Ransomware

Supply Chain Attack - axios npm Package Compromised

A supply chain attack has compromised the axios npm package, affecting over 100 devices. This incident raises major security concerns as attackers delivered a Remote Access Trojan. Organizations must act quickly to audit and secure their systems.

Huntress Blog·
HIGHMalware & Ransomware

NightSpire Ransomware - Analyzing Evolving IOCs and TTPs

A recent NightSpire ransomware incident shows how evolving tactics complicate detection and recovery. Organizations must adapt to these changes to protect their data.

Huntress Blog·
HIGHMalware & Ransomware

Storm-1175 - High-Tempo Medusa Ransomware Operations Unveiled

Storm-1175 is rapidly executing ransomware attacks, moving from initial access to deployment within 24 hours. Targeting critical sectors, they exploit vulnerabilities before patches are applied.

Microsoft Security Blog·
HIGHMalware & Ransomware

Trojanized PyPI AI Proxy Steals User Data Silently

A malicious Python package named hermes-px has been found on PyPI, masquerading as a privacy-focused AI tool. Developers are unknowingly at risk of data breaches, as the package exfiltrates sensitive information. Immediate action is required to mitigate potential damage.

Cyber Security News·
HIGHMalware & Ransomware

Malicious Strapi NPM Packages Target Guardarian Users

36 malicious NPM packages targeting Strapi users have been discovered, capable of executing shells and harvesting credentials. The attack exploits Redis and PostgreSQL vulnerabilities, posing significant risks to Guardarian's ecosystem.

SecurityWeek·
HIGHMalware & Ransomware

ILSpy Domain Compromised - Malware Delivered to Developers

Hackers compromised the ILSpy WordPress domain, redirecting users to a malicious site. Developers are at risk of malware disguised as a browser extension. Stay vigilant and verify downloads!

Cyber Security News·