• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • Bluetooth App Remote Ring with Charging Case for $16

    Bluetooth App Remote Ring with Charging Case for $16
  • 10" Wireless Car Display with Front and Rear Cameras Apple CarPlay & Android Auto Support for $112

    10" Wireless Car Display with Front and Rear Cameras Apple CarPlay & Android Auto Support for $112
  • Dell C2422HE 24" HD Video Conferencing Monitor with Built-In Speakers and Pop-Up Camera for $234

    Dell C2422HE 24" HD Video Conferencing Monitor with Built-In Speakers and Pop-Up Camera for $234
  • Choose up to 6 Best-Selling Magazine Subscriptions for just $2 each! for $2

    Choose up to 6 Best-Selling Magazine Subscriptions for just $2 each! for $2
  • Apple iPad 9th Gen 10.2" 64GB – Space Gray (Refurbished: WiFi + Cellular Unlocked) for $375

    Apple iPad 9th Gen 10.2" 64GB – Space Gray (Refurbished: WiFi + Cellular Unlocked) for $375
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

New Python Variant of Chaes Malware Targets Banking and Logistics Industries

Sep 5, 2023 by iHash Leave a Comment

Sep 05, 2023THNCyber Threat / Malware

Chaes Malware

Banking and logistics industries are under the onslaught of a reworked variant of a malware called Chaes.

“It has undergone major overhauls: from being rewritten entirely in Python, which resulted in lower detection rates by traditional defense systems, to a comprehensive redesign and an enhanced communication protocol,” Morphisec said in a new detailed technical write-up shared with The Hacker News.

Chaes, which first emerged in 2020, is known to target e-commerce customers in Latin America, particularly Brazil, to steal sensitive financial information.

A subsequent analysis from Avast in early 2022 found that the threat actors behind the operation, who call themselves Lucifer, had breached more than 800 WordPress websites to deliver Chaes to users of Banco do Brasil, Loja Integrada, Mercado Bitcoin, Mercado Livre, and Mercado Pago.

Further updates were detected in December 2022, when Brazilian cybersecurity company Tempest Security Intelligence uncovered the malware’s use of Windows Management Instrumentation (WMI) in its infection chain to facilitate the collection of system metadata, such as BIOS, processor, disk size, and memory information.

Cybersecurity

The latest iteration of the malware, dubbed Chae$ 4 in reference to debug log messages present in the source code, packs in “significant transformations and enhancements,” including an expanded catalog of services targeted for credential theft as well as clipper functionalities.

Despite the changes in the malware architecture, the overall delivery mechanism has remained the same in attacks that were identified in January 2023.

Chaes Malware

Potential victims landing on one of the compromised websites are greeted by a pop-up message asking them to download an installer for Java Runtime or an antivirus solution, triggering the deployment of a malicious MSI file that, in turn, launches a primary orchestrator module known as ChaesCore.

The component is responsible for establishing a communication channel with the command-and-control (C2) server from where it fetches additional modules that support post-compromise activity and data theft –

  • Init, which gathers extensive information about the system
  • Online, which acts as a beacon to transmit a message back to the attacker that the malware is running on the machine
  • Chronod, which steals login credentials entered in web browsers and intercept BTC, ETH, and PIX payment transfers
  • Appita, a module with similar features as that of Chronod but specifically designed to target Itaú Unibanco’s desktop app (“itauaplicativo.exe”)
  • Chrautos, an updated version of Chronod and Appita that focuses on gathering data from Mercado Libre, Mercado Pago, and WhatsApp
  • Stealer, an improved variant of Chrolog which plunders credit card data, cookies, autofill, and other information stored in web browsers, and
  • File Uploader, which uploads data related to MetaMask’s Chrome extension

Persistence on the host is accomplished by means of a scheduled task, while C2 communications entail the use of WebSockets, with the implant running in an infinite loop to await further instructions from the remote server.

The targeting of cryptocurrency transfers and instant payments via Brazils’ PIX platform is a noteworthy addition that underscores the threat actors’ financial motivations.

UPCOMING WEBINAR

Detect, Respond, Protect: ITDR and SSPM for Complete SaaS Security

Discover how Identity Threat Detection & Response (ITDR) identifies and mitigates threats with the help of SSPM. Learn how to secure your corporate SaaS applications and protect your data, even after a breach.

Supercharge Your Skills

“The Chronod module introduces another component used in the framework, a component called Module Packer,” Morphisec explained. “This component provides the module its own persistence and migration mechanisms, working much like the ChaesCore’s one.”

This method involves altering all shortcut files (LNK) associated with web browsers (e.g., Google Chrome, Microsoft Edge, Brave, and Avast Secure Browser) to execute the Chronod module instead of the actual browser.

“The malware uses Google’s DevTools Protocol to connect to the current browser instance,” the company said. “This protocol allows direct communication with the inner browser’s functionality over WebSockets.”

“The wide range of capabilities exposed by this protocol allows the attacker to run scripts, intercept network requests, read POST bodies before being encrypted, and much more.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: Banking, Chaes, computer security, cyber attacks, cyber news, cyber security news, cyber security news today, cyber security updates, cyber updates, data breach, hacker news, hacking news, how to hack, Industries, information security, Logistics, Malware, network security, Python, ransomware malware, software vulnerability, targets, the hacker news, variant

Special Offers

  • Bluetooth App Remote Ring with Charging Case for $16

    Bluetooth App Remote Ring with Charging Case for $16
  • 10" Wireless Car Display with Front and Rear Cameras Apple CarPlay & Android Auto Support for $112

    10" Wireless Car Display with Front and Rear Cameras Apple CarPlay & Android Auto Support for $112
  • Dell C2422HE 24" HD Video Conferencing Monitor with Built-In Speakers and Pop-Up Camera for $234

    Dell C2422HE 24" HD Video Conferencing Monitor with Built-In Speakers and Pop-Up Camera for $234
  • Choose up to 6 Best-Selling Magazine Subscriptions for just $2 each! for $2

    Choose up to 6 Best-Selling Magazine Subscriptions for just $2 each! for $2
  • Apple iPad 9th Gen 10.2" 64GB – Space Gray (Refurbished: WiFi + Cellular Unlocked) for $375

    Apple iPad 9th Gen 10.2" 64GB – Space Gray (Refurbished: WiFi + Cellular Unlocked) for $375

Reader Interactions

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

Announcing Service Map: Troubleshoot With Context and Confidence

Announcing Service Map: Troubleshoot With Context and Confidence

Nov 28, 2023 By iHash

Rethinking How Data is Stored and Processed Brings Scale and Speed to Modern Data-Intensive Applications

Nov 28, 2023 By iHash

Tags

* Apple attacks Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

CrowdStrike’s View on the New U.S. Policy for Artificial Intelligence (AI)

CrowdStrike’s View on the New U.S. Policy for Artificial Intelligence (AI)

The major news in technology policy circles is this month’s release of the long-anticipated Executive Order (E.O.) on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence. While E.O.s govern policy areas within the direct control of the U.S. government’s Executive Branch, they are important broadly because they inform industry best practices and […]

Apple unveils the top books of 2023 and a new Year in Review experience

November 28, 2023 UPDATE Apple unveils the top books :br(l)::br(xl):of 2023 and a new Year in Review experience Users can browse the top books and audiobooks of 2023 and explore personalized insights about the books they enjoyed this year Apple Books is the single destination for all the books and audiobooks readers love, featuring the ability to […]

Bluetooth App Remote Ring with Charging Case for $16

Expires November 29, 2123 07:59 PST Buy now and get 34% off KEY FEATURES Effortlessly navigate TikTok and other apps using this wireless remote control ring. Wanna enjoy hilarious TikTok videos and play your music without constantly tapping your screen? This ring lets you scroll, swipe, pause, and control volume. Use this ring as a […]

Choose up to 6 Best-Selling Magazine Subscriptions for just $2 each! for $2

Expires February 15, 2123 23:59 PST Buy now and get 98% off KEY FEATURES NOTE: This is an affiliate offer – selections and payment will be made with our magazine partner, BlueDolphin Magazines. Make this holiday special — get up to 6 magazines for just $2 each, with a selection of 100+ bestselling titles to […]

Apple iPad 9th Gen 10.2" 64GB – Space Gray (Refurbished: WiFi + Cellular Unlocked) for $375

Expires June 30, 2123 19:38 PST Buy now and get 18% off KEY FEATURES Stay connected on the go with Wi-Fi + 4G unlocked capabilities. Upgrade your mobile computing experience with the refurbished 9th Gen Apple iPad. This premium tablet features an expansive 10.2″ Retina display with an 8MP iSight camera. With 64GB of storage […]

Experts Uncover Passive Method to Extract Private RSA Keys from SSH Connections

Nov 27, 2023NewsroomServer Security / Encryption A new study has demonstrated that it’s possible for passive network attackers to obtain private RSA host keys from a vulnerable SSH server by observing when naturally occurring computational faults that occur while the connection is being established. The Secure Shell (SSH) protocol is a method for securely transmitting […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT