The Purple Fox malware targets vulnerable Windows systems worldwide
In this 're-export', Purple Fox has been equipped with a new malicious worm module, making it extremely flexible for scanning and infecting on Windows systems accessible via The Internet, especially those that are involved in a certain cyberattack, is in progress. This is quite dangerous because sometimes users themselves do not know that their system is becoming the target or related to a malicious activity on the internet.
Purple Fox comes with rootkit and backdoor capabilities. This malware was first discovered in 2018, after infecting at least 30,000 devices and used as a downloader to deploy other strains of malware.
According to investigations by international cybersecurity experts, the Purple Fox exploit module has also targeted Windows systems in the past. The ultimate goal is to infect Windows computers through a web browser, after focusing on exploiting vulnerabilities in memory as well as vulnerabilities that hijack the system.
Starting in May 2020, Purple Fox attacks have increased significantly, to more than 90,000 (recorded) cases, and 600% more infections, according to Guardicore statistics. Labs.
Target Windows systems connected to the internet
The malware's active port scanning and exploitation efforts started late last year based on telemetry collected using the Guardicore Global Sensors Network (GGSN).
After detecting a vulnerable Windows system that can be accessed over the Internet, Purple Fox's new worm module uses SMB password brute force to infect that system.
So far, Purple Fox has deployed malware and additional modules on a relatively large network of bots - an 'army' of nearly 2,000 compromised servers - according to a Guardicore Labs report. .
The systems included in this botnet include Windows Server devices running IIS version 7.5 and Microsoft FTP, as well as servers running Microsoft RPC, Microsoft Server SQL Server 2008 R2 and Microsoft HTTPAPI httpd 2.0 and Microsoft Terminal Service.
In addition, Purple Fox's new worm module is using phishing campaigns and web browser vulnerabilities to deploy its malicious payload.
' During the study, we observed that an infrastructure appears to be generated from a variety of servers vulnerable to exploitation and attack storing original malware. The infected machines are acting as the 'circulating stations' of the persistent malware, and the server infrastructure appears to be implicated in other malware campaigns, '' Serper and Harpaz said.
Before taking over the infected devices and maintaining stability, Purple Fox will also install a rootkit module that uses the hidden open source rootkit to hide files, folders and Windows registry created on the system. infected system.
After deploying the rootkit and restarting the device, the malware renames its DLL payload to match the Windows system DLL, and will configure it to start on system boot.
When the malware is executed, each infected system then exhibits the same behavior as a worm - constantly scanning the Internet for other targets, trying to infiltrate, and adding them to the network. botnet.
You should read it
- How to download sticker Funny purple bird on Facebook
- How to make moon cakes of purple sweet potatoes for people who are afraid of fat
- The Earth used to be purple and 8 secrets of little surprise
- How many types of malware do you know and how to prevent them?
- Ways to receive Lucci Purple, Diamond and Gold in Boom Mobile
- 10 most rare and expensive woods in the world
- Modular Malware - New stealth attack method to steal data
- Western Digital released a super-hard drive of 12 TB for AI
May be interested
- Mandrake: Super sophisticated Android malicious code, only 4 years to be discoveredmandrake will carefully select the victim. it will only target the most valuable targets (possessing large amounts of valuable data).
- How to Avoid or Remove Mac Defender Malware from Mac OS X V10.6 or Earliermac defender malware targets mac os x v10.6 or earlier version users with phishing attempts. if you fall victim to this malware, you are diverted from legitimate websites to fake websites. reaching your new destination, you are informed...
- New malware targets Windows 64-bitaccording to kaspersky lab, rootkit writers have begun exploiting a vulnerability to bypass patchguard protection built into 64-bit versions of windows.
- Windows, Android and security intelligence issueswith 4.312 billion users worldwide, ie equivalent to about 55.6% of the global population, the internet has been and will become a daily 'living space' for most events and activities. human.
- Theory - What is Ransomware?ransomware, spyware, extortion software ... are all 1. this is the common name of a type of malware - malware, has the main effect of preventing users from accessing and using the system. their nature (mostly discovered on windows operating systems) ...
- Warning: 5 million Samsung, OPPO, Vivo smartphones ... are infected with malware and this is how to check and removea large-scale malware distribution campaign has just been discovered and it is affecting nearly 5 million smartphones of major brands worldwide including honor, huawei, xiaomi, oppo, vivo, samsung and gionee.
- How to Be More Vulnerable in Relationshipsmany people struggle to be vulnerable in relationships because it means opening themselves up to rejection or ridicule. but not allowing yourself to be vulnerable with friends and loved ones can lead to you missing out on deep personal...
- BadBox Malware Is Picking Up Speed, Targeting Certain Android Devicesauthorities have discovered that a number of iot and android devices were sold with badbox pre-installed.
- Mars Stealer - dangerous malware that silently steals cryptocurrencythe mars stealer malware is only 95kb in size, but the level of danger is alarming when it can attack a variety of targets such as popular browsers, cryptocurrency wallets and two-factor authentication.
- How to Change Autoplay Settings in Windows 8autoplay can be convenient, but it can also leave you vulnerable to certain viruses and malware.https://www.winhelp.us/configure-autoplay-in-windows.html you may want to customize how this feature works. if you want to keep windows 8 from...