This malware was written in an unusual programming language, making it extremely difficult to detect
Named NimzaLoader by the cybersecurity researchers at Proofpoint, the malware was written in the Nim programming language - and it's assumed that the guys behind the malware decided to develop it in a rather strange way. In the hope that choosing an uncommon programming language will make code detection and analysis considerably more difficult.
Essentially, NimzaLoader is designed to give the malicious actors behind it access to a Windows computer, and in particular the ability to execute commands - which can give them control over the machine, stealing sensitive information or even the ability to deploy additional malware.
According to preliminary analysis, the NimzaLoader malware is most likely the work of a group of cybercriminals Proofpoint calls TA800. The group is currently launching a series of offensive operations targeting a wide range of industrial sectors across North America.
In addition, this group is also believed to be closely related to BazarLoader, a trojan-type malware that possesses the ability to create a full backdoor on compromised Windows machines. At the same time, BazarLoader can also be used to perform ransomware attacks.
Like BazarLoader, NimzaLoader was distributed using phishing emails linking potential victims with a fake PDF downloader, which, if run, would load the malware onto the machine. Phishing emails are often targeted specifically with custom references related to personal details such as the recipient's name and the company with which they work.
Similar to the previous BazarLoader, the possibility that NimzaLoader could be used as a tool hired by cybercriminals as a means of spreading their own malware attacks.
Given the fact that phishing is the main means of distributing NimzaLoader, organizations and businesses should ensure that their network is secured with tools that help prevent malicious emails completely. In addition, there is a need to promote staff training on how to detect phishing emails, especially when campaigns like these often try to exploit personal information as a means of keeping victims off guard. .
You should read it
- Analyze Malware actions
- Hackers antivirus application preinstalled on Xiaomi phones into malware
- Warning campaign to spread malicious code through 'green tick' pages on Facebook
- Hackers are using new Microsoft Office vulnerabilities to distribute malware
- GandCrab blackmail extinguished after earning $ 2.5 billion worldwide
- Malware takes advantage of Android smartphones like Botnets
- How to Fix a Malware Infection on Your Computer
- Answer these 5 questions before clicking on any link
May be interested
- The chart for the 10 most amazing versions of Windowsmore than 35 years have passed since the time microsoft released what changed the face of the computer industry: the windows operating system.
- Revelations suggest that the iPhone 13 will not be releasedit is speculated that apple will launch the iphone 12s this year, skipping the number 13 to continue launching the iphone 14 or 15 for 2022.
- Computer History: Brief history of formation and developmentover time, computers have evolved from massive machines just for professionals to life-bound devices. click on the post to see details about the creation and development of the computer.
- Microsoft silently rolled out a patch that fixes strange drive errors on Windows 10earlier this past january, there were many reports from a series of windows 10 users around the world that this operating system contained a strange error, in which the system displayed a message that the drive was damaged and the person users should reboot the system if you want to continue working.
- Microsoft removed the most 'useless' folder on Windows 10 from File Explorermicrosoft has finally officially stopped treating 3d objects - one of the least used folders - as a special folder in file explorer.
- Windows Terminal adds a tool to edit hidden graphics settingswindows terminal is an open source application developed by microsoft that allows you to open multiple console tabs in the same windows. each of these dashboard tabs can be used for different shells.