Malware stored in Google Sites sends data to the MySQL server
Recently, security researchers have found some malware hosted on the Google Sites platform to build on websites. However, the real threat lies in the fact that fraudsters steal information can take advantage of this vulnerability to send victim data to their own controlled MySQL server in a simple and quick way.
- Apple updates XProtect to block 'Windows' malware on a Mac
This newly discovered malware is named LoadPCBanker. In essence, it is an executable file disguised as a PDF file containing the reservation information of a guest house or hotel, and also 'residing' in the File Cabinet's storage space for Google Site.
Accordingly, the name of the extracted PDF file will be "PDF Request Details MANOEL CARVALHO hospedagem familiar detalhes PDF.exe". Based on the name of the extracted PDF file, it can be seen that the attacker is targeting English-speaking and / or Portuguese-speaking victims.
Security researchers in Netskope have officially reported on related Google sites that hosted malware on April 12. However, Google has not taken any action to prevent or fix the problem. At the time of writing, the malware samples are still stored and downloadable!
- Malicious ad campaigns abuse Chrome to steal 500 million iOS user sessions
When using VirusTotal's malware scanning service, the researchers noted that 47 out of 66 anti-virus tools were listed on the VirusTotal platform, which could detect the malicious code.
"Attackers are more likely to use the Google sites to create an arbitrary website, then use the cabinet file template to upload payloads and finally send the resulting URL to potential targets," experts said. security expert Netskope said.
- Adblock Plus filter can be exploited to run malicious code
When launched, the fake PDF will silently create a directory and download the payloads named libmySQL50.DLL, otlook.exe and cliente.dll from the Kinghost file hosting site.
It can be clearly seen that the payload 'otlook.exe' is so named in order to impersonate the Microsoft Outlook email application. In fact, this payload is 'a dangerous information stealer', can take screenshots, record the data stored in the clipboard and also record the login passwords on the victim system.
Besides, it also functions as a downloader for files that contain login information and connection details for SQL databases that receive stolen information. This file will then be updated continuously with new access information.
In order to 'transport' data more efficiently, more malicious code will take advantage of the help of the DLL component, which is a library that facilitates connection to database servers easily. easier.
- Reveal personal data of more than 1.3 million people from a vulnerability in web application
A obtained database record shows that there are two information tables: The first table displays information about the infected system, while the other one contains information about the stolen clipboard data as follows:
"During the analysis, we have determined that the attacker seems to be particularly interested in monitoring a specific system of devices and taking screenshots of some information from victim computers. This result was obtained after we noticed a lot of feedback from infected computers, but only a few were actively monitored, "the team said.
Besides, the researchers also believe that in fact, there was a similar type of malware that appeared around the beginning of 2014. Meanwhile, recent offensive campaigns began to be recorded from about February this year. It is still unclear whether there is only one person behind all of these attacks, or malware code shared with various cybercrime organizations.
You should read it
- Google 'purged' 24 applications downloaded nearly 500,000 times containing malicious malware
- Detecting Android malware can easily steal OTP code without the victim knowing
- Can a VPN Fight Malware?
- More than 100,000 pages using Wordpress are infected with malware
- 10 typical malware types
- Malicious Code EvilGnome attacks Linux systems with many rare tricks
- 9 malicious applications on Google Play, if installed, should be removed immediately
- Fileless malware - Achilles heel of traditional antivirus software
May be interested
- Instructions on how to connect to MySQL Server in IntelliJhow to connect mysql server in intellij? detailed instructions on how to connect to mysql server in intellij, it is time to quit mysql workbench
- Google Photos sends many private videos of some users to strangers due to technical issuesgoogle photos - the photo and video sharing and storage service of google has a security vulnerability that caused some of the videos stored on them to have been exported to the archives of many random unidentified users. year old.
- Install Cherokee with PHP5 and MySQL supported in Fedora 14currently, cherokee is one of the lightest web server, high flexibility and easy to configure and set up. in addition, it also supports many advanced technology platforms such as fastcgi, scgi, php, cgi, encryption connecting tls and ssl protocols, virtual hosts, encryption mechanisms, load balancing of resources, data data of the system, apache log file ...
- How to create a free website with Google Sitesgoogle web sites is how google allows users to create personal google websites. although it's not as easy as using google page creator, this is a good online site builder. google web sites offers a number of tools that you can't find at google page creator. once you are familiar with google web sites, you will enjoy creating websites with this tool.
- How to Learn PHP and MySQLphp is one of the most widely-used programming languages on the internet, and it allows you to do much more than simple html. mysql allows you to easily create and modify databases on your server. used together, these tools can create...
- How to Install the MySQL Database Server on Your Windows PCthis wikihow teaches you how to install the mysql server program on a windows 10 computer. in order to install mysql on a windows computer, you must first have python 2.7 (not python 3+) installed. open the python download page. go to...
- Compare the performance of MongoDB and SQL Server 2008in the following article, we will point out the difference in performance of the relatively new database management system, which is mongodb and one of the popular systems like sql server (mysql or oracle). most of the data is given here in the form of charts, so we can easily imagine the advantages and disadvantages of mongodb as well as other database management systems.
- Steps to Import data from different tables in MySQL Workbenchinstructions on how to export and import data from different tables in a mysql database through the mysql workbench tool
- How to avoid Malware when downloading Pokemon GO?security experts discovered that malware was embedded in a pokemon go version outside of google play store. so when users download pokemon go versions on other sites other than google play store, they most likely install some malware that comes with the game without them knowing.
- Guide to creating Virtual Hosting with PureFTPd and MySQLin the following article, tipsmake.com will show you how to install the pureftpd server using virtual user accounts from mysql's database, all inside the real system.