This new Windows malware scans your phone to steal data

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • PCHF IT Feeds
    PCHF Bot
    • Jan 2015
    • 54692

    #1

    This new Windows malware scans your phone to steal data

    Cybersecurity researchers have discovered a new malware strain for Windows that’s capable of stealing sensitive data from any connected device, including mobile phones, and is apparently being used by groups connected to the North Korean government.

    Experts from ESET said to have stumbled upon a previously unknown infostealer called Dolphin. Apparently, Dolphin is being used by a threat actor known as APT 37, or Erebus, a group with known ties to the North Korean government. The group, the researchers are saying, has been active for roughly a decade.

    Dolphin was first spotted in April 2021, but has since evolved into quite the beast. Nowadays, it is capable of stealing information from web browsers (stored passwords, credit card data, etc.), taking screenshots of the infected endpoints, as well as logging all keystrokes.

    [HEADING=1]Sending everything to Google Drive[/HEADING]

    The malware gets its commands from a Google Drive instance, and sends all the gathered intelligence there as well.

    Besides all this, Dolphin also gathers information such as your computer’s name, local and external IP address, security solutions installed on the endpoint, hardware specs and operating system version.

    Read more
    Google says it stopped North Korea hacking Chrome

    FBI says North Korean Lazarus group was behind huge crypto theft

    Here are the best identity theft protection solutions around
    What’s more, it scans all local and removable drives for sensitive data (documents, emails, photos and videos, etc.), as well as smartphones. ESET says this was made possible through the Windows Portable Device API.

    So far, four different versions of the malware were spotted in the wild, with the latest, version 3.0, released in January 2022.

    North Korea is relatively active on the cybercrime scene, with a couple of major state-sponsored groups wreaking havoc across the digital world. Perhaps the most infamous example is Lazarus Group, which managed to steal some $600 million from cryptocurrency firm Ronin Bridge. Intelligence reports suggest the North Korean government is employing cybercriminal outfits to fund its operations.

    [ul]
    [li]Here’s the rundown of the best antivirus programs right now[/li][/ul]

    Via: BleepingComputer

    Continue reading…
Working...