Malware & RansomwareHIGH

Malware Alert - Elastic Security Labs Uncovers BRUSHWORM

ELElastic Security Labs
Summary by CyberPings EditorialΒ·AI-assistedΒ·Reviewed by Rohit Rana
Updated:
🎯

Basically, two types of malware were found that steal data and spread through USB drives.

Quick Summary

Elastic Security Labs has discovered two new malware types, BRUSHWORM and BRUSHLOGGER, targeting a South Asian financial institution. These threats use USB drives to spread and steal sensitive data. Organizations must act swiftly to mitigate risks and protect their data.

What Happened

Recently, Elastic Security Labs uncovered two custom malware components targeting a South Asian financial institution. These components, named BRUSHWORM and BRUSHLOGGER, pose significant threats to data security. BRUSHWORM acts as a modular backdoor, while BRUSHLOGGER functions as a keylogger. The malware was discovered during an investigation where the victim's infrastructure had only minimal visibility, making it challenging to track malicious activities.

BRUSHWORM is designed to establish persistence, communicate with command-and-control (C2) servers, and exfiltrate sensitive files. It spreads through removable media, making it particularly dangerous in environments where USB drives are commonly used. Meanwhile, BRUSHLOGGER captures keystrokes, providing attackers with access to sensitive information such as passwords and confidential communications.

Who's Being Targeted

The primary target of this malware is a South Asian financial institution. This sector is often a lucrative target due to the sensitive financial data it handles. The malware's ability to spread via USB drives increases the risk, especially in corporate environments where employees frequently use portable storage devices.

The malware's design indicates that it was likely developed by an inexperienced author, as evidenced by coding mistakes and the use of free dynamic DNS infrastructure for testing versions. This suggests a potential lack of thorough security practices in the development process.

Signs of Infection

Organizations should be vigilant for several signs of infection. If users notice unusual file activity, such as unexpected files on USB drives or unauthorized access to sensitive documents, these could be indicators of BRUSHWORM's presence. Additionally, the keylogger's operation might result in strange behavior in applications where sensitive data is entered.

To detect the malware, IT teams should monitor for scheduled tasks that may have been created without authorization. The malware creates tasks to ensure it runs at startup, which can be a red flag for system administrators.

How to Protect Yourself

To protect against these threats, organizations should implement robust security measures. Here are some recommended actions:

  • Educate Employees: Train staff on the dangers of USB drives and phishing attempts that may lead to malware infections.
  • Use Antivirus Solutions: Ensure that all systems have updated antivirus software that can detect and block known malware signatures.
  • Monitor Network Traffic: Keep an eye on unusual outbound connections, especially to unknown domains, which may indicate C2 communication.
  • Implement Data Loss Prevention (DLP): Use DLP solutions to monitor and control data transfers, especially to removable media.

By taking these proactive steps, organizations can reduce the risk of infection and protect sensitive data from being compromised.

πŸ”’ Pro insight: The simplistic design of BRUSHWORM and BRUSHLOGGER suggests a potential shift towards less sophisticated, yet effective, malware targeting financial institutions.

Original article from

ELElastic Security Labs
Read Full Article

Also covered by

CYCyber Security News

Hackers Deploy BRUSHWORM and BRUSHLOGGER Against South Asian Financial Firm

Read Article

Related Pings

HIGHMalware & Ransomware

Malware Newsletter Round 91 - Latest Threats and Insights

The latest malware newsletter reveals new threats like Infiniti Stealer and npm supply chain attacks. Developers and organizations must stay alert to evolving risks in cybersecurity.

Security AffairsΒ·
HIGHMalware & Ransomware

Malicious Email Delivers CMD Malware - Privilege Escalation Alert

A malicious email has delivered a .cmd malware file that escalates privileges and bypasses antivirus systems. Users are at risk of significant system compromise. Awareness and immediate action are vital to mitigate this threat.

Security AffairsΒ·
HIGHMalware & Ransomware

Axios NPM Package Compromised - Supply Chain Attack Exposed

A major supply chain attack compromised the Axios NPM package, affecting millions of users. Malicious versions deployed a RAT, posing serious security risks. Swift action was taken to remove the threats.

Trend Micro ResearchΒ·
HIGHMalware & Ransomware

Brokk Hacked - Play Ransomware Exposes Sensitive Data

Brokk has reportedly been hacked by Play ransomware, leading to the leak of sensitive corporate data. This incident could severely impact the company's reputation and security. Organizations must bolster their defenses to prevent similar breaches.

SC MediaΒ·
HIGHMalware & Ransomware

Chaos Malware - New Targeting of 64-bit Linux Servers

Chaos malware has evolved to target 64-bit Linux servers, expanding its attack surface. This shift raises alarms for organizations relying on these systems. Enhanced security measures are now crucial to protect against potential larger-scale attacks.

SC MediaΒ·
HIGHMalware & Ransomware

Phorpiex Botnet - Spreading Ransomware and Sextortion Tactics

The notorious Phorpiex botnet is back, spreading ransomware and sextortion schemes. Millions are at risk as it targets users globally. Stay alert and protect your devices from this evolving threat.

Cyber Security NewsΒ·