Oyster Backdoor Propagation Through Trojanized Widely Used Software Downloads

Jun 21, 2024NewsroomMalware / Malvertising

An aggressive advertising campaign is exploiting trojanized installers for well-known applications like Google Chrome and Microsoft Teams to introduce a backdoor named Oyster (also known as Broomstick an

Oyster Backdoor Spreading via Trojanized Popular Software Downloads

Jun 21, 2024NewsroomMalware / Malvertising

Oyster Backdoor Spreading via Trojanized Popular Software Downloads

An aggressive advertising campaign is exploiting trojanized installers for well-known applications like Google Chrome and Microsoft Teams to introduce a backdoor named Oyster (also known as Broomstick and CleanUpLoader).

This information comes from reports released by Rapid7, which discovered imitating websites hosting the harmful payloads that users are directed to after looking for them on search engines such as Google and Bing.

The individuals behind the threat are enticing gullible users to counterfeit websites claiming to offer genuine software. However, any attempt to download the setup file triggers a series of malware infections instead.

More specifically, the executable acts as a pathway for a backdoor called Oyster, capable of collecting data about the compromised device, communicating with a predefined command-and-control (C2) location, and facilitating remote code execution.

Cybersecurity

Even though Oyster has previously been spotted being distributed through a dedicated loader component known as Broomstick Loader (also known as Oyster Installer), the latest attack sequences involve the direct deployment of the backdoor. This malware has been linked with ITG23, a group connected to Russia responsible for the TrickBot malware.

The execution of the malware is followed by the installation of the legitimate Microsoft Teams software in an effort to maintain the deception and avoid raising suspicions. Rapid7 also noted the use of the malware to generate a PowerShell script tasked with establishing persistence on the device.

This revelation coincides with the discovery of a criminal group named Rogue Raticate (also known as RATicate) believed to be responsible for an email phishing campaign utilizing PDF decoys to entice users into clicking on a malicious URL and deliver NetSupport RAT.

Trojanized Software

“If a user is successfully deceived into clicking the URL, they will be led through a Traffic Distribution System (TDS) into the remainder of the chain, ultimately having the NetSupport Remote Access Tool installed on their device,” Symantec stated.

This development also aligns with the emergence of a new phishing-as-a-service (PhaaS) platform known as the ONNX Store that enables clients to orchestrate phishing campaigns using embedded QR codes in PDF attachments leading victims to credential harvesting pages.

The ONNX Store also offers Bulletproof hosting and RDP services through a Telegram bot and is believed to be a rebranded version of the Caffeine phishing kit, initially reported by Google-owned Mandiant in October 2022 and operated by an Arabic-speaking threat actor known as MRxC0DER.

Cybersecurity

In addition to utilizing Cloudflare’s anti-bot mechanisms to avoid detection by phishing website scanners, the URLs shared through the quishing campaigns contain encrypted JavaScript that gets decoded during page load to gather victims’ network metadata and transmit 2FA tokens.

“The ONNX Store incorporates a two-factor authentication (2FA) bypass system that intercepts [two-factor authentication] requests from victims,” stated Arda Büyükkaya, a researcher at EclecticIQ noted. “The phishing pages are designed to resemble authentic Microsoft 365 login interfaces, tricking targets into entering their authentication details.”

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.