Crypto-Stealing Python Pack Targeting Raydium and Solana Users Distributed via StackExchange
Published on August 2, 2024
The Iranian threat group Emennet Pasargad has enhanced its notorious malware. The newest version of the custom modular infostealer dubbed WezRat by Check Point Research can execute commands, take screenshots, upload files, perform keylogging, and steal clipboard content and cookie files. Â
This evolution has prompted a joint Cyber Security Advisory from the FBI, the U.S. Department of the Treasury, and the Israeli National Cybersecurity Directorate (INCD), attributing this malware to the Iranian entity. Known for its audacious cyber operations across the U.S., France, Sweden, and Israel, this group continues to pose significant threats to global cybersecurity.
The most recent campaign targeted multiple Israeli organizations through emails masquerading as communications from the INCD. These phishing attempts included a false alert about the urgent necessity to update their Chrome browser.Â
Victims who clicked the link were redirected from the legitimate INCD site to a fake one, leading to the download of a file containing both the genuine Google Chrome installer and a hidden backdoor. This backdoor execution, stealthily named "Chrome Updater," ensured continued access for attackers.
The CPR report says WezRat's new version further obscures its malicious activities by downloading additional modules from the command and control (C&C) server as DLL files, which reduces suspicion surrounding its primary component.Â
Further analysis has uncovered partial source code for the backend, indicating that separate groups may handle the malware's development and operational deployment.
This distinct separation of development and operational functions within the organization highlights a sophisticated structure behind WezRat, where, typically, a single entity would manage both aspects.Â
Recently, Iranian government-backed cyber espionage group MuddyWater was seen deploying a new malware campaign aimed at Israeli organizations. The phishing operation used PDF-embedded URLs that download malware, with lures like invitations to webinars.