New Loader Delivering Spyware via Image Steals Cryptocurrency Info

Sophisticated attackers are lacing malware into PNG image files in order to steal cryptocurrency and business information.

3 Min Read
Source: Nico El Nino via Alamy

A sophisticated attack by Russian-language actors is using a novel loader and malware-laced PNG image file to drop malware for stealing cryptocurrency or business account information, researchers said. The multistage campaign appears to be primarily targeting entities in Europe, the United States, and Latin America, Kaspersky researchers wrote in a blog post published June 12.

The attack begins with "DoubleFinger," a multistage loader that drops a image file containing malicious code onto a victim's computer. The malware infects victims with "GreetingGhoul," a novel stealer specially designed to siphon off cryptocurrency credentials.

However, DoubleFinger isn't exclusive to cryptocurrency attacks, the Kaspersky researchers said, as researchers also observed it dropping Remcos RAT, a popular tool among financially motivated cybercriminals. Once the Remcos RAT gets into an enterprise network, stopping the malware and its follow-on attacks can be difficult for businesses.

Russian-speaking artifacts within the code suggest that the perpetrators of this campaign come from a Commonwealth of Independent States nation, though the researchers qualified that "the pieces of Russian text and the victimology are not enough to conclude that the ones behind this campaign are indeed from the post-Soviet space."

Stenography for Cryptocurrency

DoubleFinger attacks begin with a phishing email. If the victim clicks on the associated malicious program information file (.pif). This triggers a chain reaction leading to some malicious shellcode downloading a PNG image from imgur.com. The seemingly nondescript image utilizes steganography — hiding secret information within nonsecret data. The shellcode searches the PNG for a particular string in its code, 0xea79a5c6, which contains an encrypted payload.

The PNG with embedded shellcode.

The PNG with embedded shellcode. Source: Kaspersky

At the end of this attack chain, more often than not, is GreetingGhoul, an infostealer with two primary functions: It can detect victims' cryptocurrency wallet apps and steal the sensitive credentials associated with them. GreenGhoul uses MS WebView2 — a tool for embedding web code into desktop apps — to overlay phishing pages on top of legitimate crypto-wallet interfaces. It's a move that evokes banking Trojans of old, as users unwittingly type their sensitive wallet credentials into attacker-controlled fields.

The image below, for example, depicts an overlay mimicking Ledger, the world's most popular vendor for cryptocurrency hardware wallets. It prompts victims to enter their wallet's seed phrase — the ultrasensitive set of 12 or 24 words which generates their private key, and grants unfettered access to all contents of the wallet. This is why cryptocurrency investors are regularly reminded to never give up their seed phrases to access their wallets to anyone.

An overlay mimicking Ledger, the world's most popular vendor for cryptocurrency hardware wallets. It prompts victims to enter their wallet's seed phrase.

Source: Kaspersky

About the Author(s)

Nate Nelson, Contributing Writer

Nate Nelson is a freelance writer based in New York City. Formerly a reporter at Threatpost, he contributes to a number of cybersecurity blogs and podcasts. He writes "Malicious Life" -- an award-winning Top 20 tech podcast on Apple and Spotify -- and hosts every other episode, featuring interviews with leading voices in security. He also co-hosts "The Industrial Security Podcast," the most popular show in its field.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights