Skip to main content

New PHP Version of Ducktail info-stealer hijacks Facebook Business accounts


Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54

October 15, 2022  By Pierluigi Paganini

 

Experts spotted a PHP version of an information-stealing malware called Ducktail spread as cracked installers for legitimate apps and games.

Zscaler researchers discovered a PHP version of an information-stealing malware tracked as Ducktail. The malicious code is distributed as free/cracked application installers for a variety of applications including games, Microsoft Office applications, Telegram, and others.  

 

>> Full Article <<

5 replies

Jamesharris85
New Voice
Forum|alt.badge.img+4

This is all i thought of when I read Ducktail…

 

 


Forum|alt.badge.img+33
  • Community Expert Advisor
  • 544 replies
  • October 17, 2022

LOL


Jamesharris85
New Voice
Forum|alt.badge.img+4

Quality Saturday morning entertainment right there. They don’t make them like that anymore. 


russell.harris
Popular Voice
Forum|alt.badge.img+5

Omg. So true! Kids these days just don’t get that kind of quality!


tmcmullen
Popular Voice
Forum|alt.badge.img+6
  • Popular Voice
  • 177 replies
  • October 26, 2022

Hand holding dollar symbol

A new Ducktail phishing campaign is spreading a never-before-seen Windows information-stealing malware written in PHP used to steal Facebook accounts, browser data, and cryptocurrency wallets.

Ducktail phishing campaigns were first revealed by researchers from WithSecure in July 2022, who linked the attacks to Vietnamese hackers.

 

Those campaigns relied on social engineering attacks through LinkedIn, pushing .NET Core malware masquerading as a PDF document supposedly containing details about a marketing project.

Ukrainian charged for operating Raccoon Stealer malware serviceMicrosoft: Vice Society targets schools with multiple ransomware familiesDutch police arrest hacker who breached healthcare software vendorVMware fixes critical Cloud Foundation remote code execution bugMassive cryptomining campaign abuses free-tier cloud dev resourcesNew Samsung Maintenance Mode protects your data during phone repairs

 

 

 

 

 

The malware targeted information stored in browsers, focusing on Facebook Business account data, and exfiltrated it to a private Telegram channel that acted as a C2 server. These stolen credentials are then used for financial fraud or to conduct malicious advertising.

 

Zscaler now reports spotting signs of new activity involving a refreshed Ducktail campaign that uses a PHP script to act as a Windows information-stealing malware.

A PHP information-stealing malware

Ducktail has now replaced the older NET Core information-stealing malware used in previous campaigns with one written in PHP.

Most of the fake lures for this campaign are related to games, subtitle files, adult videos, and cracked MS Office applications. These are hosted in ZIP format on legitimate file hosting services.

When executed, the installation takes place in the background while the victim sees fake 'Checking Application Compatibility' pop-ups in the frontend, waiting for a fake application sent by the scammers to install.

The malware will ultimately be extracted to the %LocalAppData%\Packages\PXT folder, which includes the PHP.exe local interpreter, various scripts used to steal information, and supporting tools

Above information taken from the following article: https://www.bleepingcomputer.com/news/security/new-php-information-stealing-malware-targets-facebook-accounts/


Reply