Depraved Malware Manipulates BOINC Project for Secret Cyberassaults
The JavaScript downloader virus recognized as SocGholish (also known as FakeUpdates) is being utilized to transmit a distant access trojan known as AsyncRAT as well as a valid open-source assignment named BOINC.
BOINC, abbreviated for Berkeley Open Infrastructure Network Computing Client, is an open-source “volunteer computing” platform sustained by the University of California with a goal to undertake “large-scale distributed high-throughput computing” employing participating home computers on which the application is set up.
“It’s akin to a cryptocurrency digger in that way (using computer resources to carry out tasks), and it’s in fact developed to reward users with a particular kind of cryptocurrency known as Gridcoin, designed for this purpose,” Huntress investigators Matt Anderson, Alden Schmidt, and Greg Linares stated in a article distributed last week.

These malicious installations are crafted to connect to an actor-managed domain (“rosettahome[.]cn” or “rosettahome[.]top”), effectively operating as a command-and-control (C2) server to accumulate host data, send payloads, and issue added commands. As of July 15, 10,032 clients are linked to the two domains.
The cybersecurity organization mentioned that while it hasn’t observed any subsequent activity or chores being performed by the compromised hosts, it speculated that the “host connections could be sold off as initial access vectors to be used by other actors and potentially utilized to run ransomware.”
SocGholish attack progressions generally start when users reach jeopardized websites, where they are urged to retrieve a counterfeit browser update that, upon implementation, activates the acquisition of extra payloads to the penetrated machines.
The JavaScript downloader, in this instance, kicks off two disjoined chains, one that results in the installation of a fileless form of AsyncRAT and the other culminating in the BOINC setup.
The BOINC application, which is relabeled as “SecurityHealthService.exe” or “trustedinstaller.exe” to dodge detection, establishes persistence via a scheduled chore by means of a PowerShell script.
The exploitation of BOINC for malevolent motives has not escaped the attention of the project administrators, who are presently probing the issue and identifying a way to “overcome this malware.” Indications of the misuse trace back to at least June 26, 2024.
“The motivation and purpose of the threat actor by loading this software onto infected hosts isn’t evident at this juncture,” the investigators expressed.
“Infected clients actively connecting to malevolent BOINC servers pose a relatively high risk, as there’s potential for a driven threat actor to abuse this connection and run any variety of malevolent directives or software on the host to further boost privileges or traverse laterally through a network and jeopardize an entire domain.”
The evolution occurs as Check Point mentioned it’s been monitoring the utilization of compiled V8 JavaScript by malware authors to avoid static detections and mask distant access trojans, theft tools, loaders, cryptocurrency miners, wipers, and ransomware.
“In the ongoing battle between security professionals and threat actors, malware developers continue to devise new tactics to conceal their attacks,” security analyst Moshe Marelus remarked. “It’s not unexpected that they’ve started employing V8, as this technology is universally utilized to develop software as it is highly prevalent and exceedingly difficult to analyze.”

