• AutoTL;DR@lemmings.worldB
    link
    fedilink
    English
    arrow-up
    5
    ·
    11 months ago

    This is the best summary I could come up with:


    Judging by the evidence to hand, it appears the Windows malware DanaBot, or something related or connected to it, infects victims’ PCs – typically from spam emails and other means – and then waits for the user to visit their bank website.

    The script is fairly smart: it communicates with a remote command-and-control (C2) server, and removes itself from the DOM tree – deletes itself from the login page, basically – once it’s done its thing, which makes it tricky to detect and analyze.

    These include injecting a prompt for the user’s phone number or two-factor authentication token, which the miscreants can use with the intercepted username and password to access the victim’s bank account and steal their cash.

    “This sophisticated threat showcases advanced capabilities, particularly in executing man-in-the-browser attacks with its dynamic communication, web injection methods and the ability to adapt based on server instructions and current page state,” Langus warned.

    PS: AT&T Alien Labs this week drilled into information-stealing malware dubbed JaskaGO, which is written in Go and said to pose “a severe threat to both Windows and macOS operating systems.”

    The code uses multiple techniques to persist on an infected computer, and can siphon data including login credentials stored by browsers and attack cryptocurrency wallets.


    The original article contains 619 words, the summary contains 208 words. Saved 66%. I’m a bot and I’m open source!