Home » News » Windows systems are being targeted by brand-new Python malware

Windows systems are being targeted by brand-new Python malware

(Image Credit Google)
Securonix cybersecurity researchers recently discovered a new Python-based malware that can steal files from affected endpoints and record keystrokes. Since August 2022, the researchers have discovered multiple versions of the malware, which is known as PY#RATION. This suggests that it is being actively developed. The malware communicates with the command and control (C2) server via the WebSocket protocol to obtain instructions and possibly extract sensitive data. Also Read: Wiper malware is in the air, as it is effective, fast, & irreversible The malware, according to Securonix, "uses Python's built-in Socket." IO framework, which supports both client and server WebSocket communication with its features." This is the channel that the malware uses to get commands and get data. According to the publication, the advantage of WebSocket is that it enables the malware to simultaneously receive and send data over a single TCP connection via commonly used ports. [caption id="attachment_84685" align="alignright" width="1000"] Trismegist san via Shutterstock[/caption]

Numerous features:

Additionally, the researchers stated that the attackers used the same C2 address throughout. The researchers assumed that PY#RATION was going undetected for months because the IPVoid checking system has yet to block the address. Network enumeration, file transfer to and from the C2, keylogging, shell commands execution, host enumeration, cookie exfiltration, password exfiltration from the browser, and clipboard data theft are all features of PY#RATION. Also Read: 5 Easy Steps to Safeguard Your Business from Cyberattacks The malware is being distributed by the attackers via traditional phishing emails. The email contains a.ZIP archive that is password-protected. When the archive is unpacked, it contains two shortcut files that are designed to resemble image files: front.jpg.lkn and back.jpg.lnk. The front and back of a fake driver's license are referred to in the file names "front" and "back." The front.txt and back.txt files will be downloaded from the internet if the victims click on the files. After that, they are renamed and run as.bat files. To discourage its removal from the system, the malware itself attempts to disguise itself as Microsoft's virtual assistant Cortana.

By Raulf Hernes

If you ask me raulf means ALL ABOUT TECH!!

RELATED NEWS

Elon Musk revealed his newest project, XMail, an e...

news-extra-space

Prepare to navigate your friends' Stories using a ...

news-extra-space

Apple faces a challenge from the Cash program, the...

news-extra-space

Remember how difficult it was to Shazam a catchy T...

news-extra-space

Following the viral popularity of its AI selfies, ...

news-extra-space

The days of awkward keyword searches and never-end...

news-extra-space
2
3
4
5
6
7
8
9
10