Fake CrowdStrike repair manual pushes new infostealer malware

Teilen:

CrowdStrike is warning that a fake recovery manual to repair Windows devices is installing a new information-stealing malware called Daolpu.

Since Friday, when the buggy CrowdStrike Falcon update caused global IT outages, threat actors have quickly begun to capitalize on the news to deliver malware through fake fixes.

A new campaign conducted through phishing emails pretends to be instructions on using a new Recovery Tool that fixes Windows devices impacted by the recent CrowdStrike Falcon crashes.

Once active on the system, the stealer harvests account credentials, browser history, and authentication cookies stored in Chrome, Edge, Firefox, and the Cốc Cốc web browsers.

Spreading Daolpu

Daolpu stealer is believed to be spread via phishing emails that carry a document attachment disguised as a Microsoft recovery manual, named ‘New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows. docm.’

This document is a copy of a Microsoft support bulletin that provides instructions on using a new Microsoft Recovery Tool that automates deleting the problematic CrowdStrike driver from Windows devices.

However, this document contains macros that, when enabled, download a base64-encoded DDL file from an external resource and drops it to ‘% TMP%mscorsvc.dll.’

Next, the macros use Windows certutil to decode the base64-encoded DLL, which is executed to launch the Daolpu stealer on the compromised device.

Daolpu terminates all running Chrome processes and then attempts to collect login data and cookies saved on Chrome, Edge, Firefox, and other Chromium browsers.

Analysis by BleepingComputer shows that it also targets Cốc Cốcm, a web browser primarily used in Vietnam, possibly indicating the malware’s origin.

The stolen data is temporarily saved to ‘%TMP%\result.txt,’ and then wiped after it’s sent back to the attackers at their C2 server using the URL ‘http[:]//172.104.160[.]126:5000/Uploadss’.

CrowdStrike’s advisory about the new malware includes a YARA rule to detect artifacts of the attack and lists the associated indicators of compromise.

CrowdStrike urges its customers to only follow advice found on the company’s website or other trusted sources after confirming the authenticity of their communications.

The fallout

Unfortunately, Daolpu is just the latest example of a large-scale effort by cybercriminals to take advantage of the chaotic situation caused by CrowdStrike’s Falcon update late last week, causing approximately 8.5 million Windows systems to crash and requiring manual restoration effort.

Previously reported malicious activity taking advantage of the CrowdStrike Falcon outages includes data wipers spread by the pro-Iranian hacktivist group ‘Handala’ and HijackLoader dropping Remcos RAT disguised as a CrowdStrike hotfix.

In general, there has been a notable increase in phishing attempts impersonating CrowdStrike representatives to distribute malware and a massive effort to register new domains to conduct these malicious campaigns.

For the latest official remediation advice from CrowdStrike, monitor this webpage, which is updated with new official recommendations from the company.

Microsoft has also released a custom recovery tool for impacted Windows systems to help speed up recovery.

The fallout from CrowdStrike’s faulty Falcon update is not expected to clear up soon , and cybercriminals’ exploitation attempts are likely to persist and continue at a high pace for a while.

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
12:53 am, Jan. 21, 2025
Wetter-Symbol 4°C
L: 1° | H: 5°
overcast clouds
Luftfeuchtigkeit: 91 %
Druck: 1017 mb
Wind: 6 mph SSW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 100%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 7:53 am
Sonnenuntergang: 4:29 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 9:00 pm
Wetter-Symbol
1° | 5°°C 0 mm 0% 4 mph 94 % 1017 mb 0 mm/h
Tomorrow 9:00 pm
Wetter-Symbol
3° | 5°°C 0.2 mm 20% 8 mph 96 % 1009 mb 0 mm/h
Do. Jan. 23 9:00 pm
Wetter-Symbol
2° | 8°°C 1 mm 100% 14 mph 88 % 1007 mb 0 mm/h
Fr. Jan. 24 9:00 pm
Wetter-Symbol
5° | 11°°C 1 mm 100% 23 mph 91 % 1006 mb 0 mm/h
Sa. Jan. 25 9:00 pm
Wetter-Symbol
3° | 6°°C 1 mm 100% 10 mph 83 % 1010 mb 0.8 mm/h
Today 3:00 am
Wetter-Symbol
3° | 4°°C 0 mm 0% 3 mph 92 % 1017 mb 0 mm/h
Today 6:00 am
Wetter-Symbol
3° | 3°°C 0 mm 0% 3 mph 94 % 1016 mb 0 mm/h
Today 9:00 am
Wetter-Symbol
3° | 3°°C 0 mm 0% 2 mph 93 % 1015 mb 0 mm/h
Today 12:00 pm
Wetter-Symbol
5° | 5°°C 0 mm 0% 4 mph 77 % 1015 mb 0 mm/h
Today 3:00 pm
Wetter-Symbol
6° | 6°°C 0 mm 0% 3 mph 73 % 1013 mb 0 mm/h
Today 6:00 pm
Wetter-Symbol
4° | 4°°C 0 mm 0% 3 mph 89 % 1012 mb 0 mm/h
Today 9:00 pm
Wetter-Symbol
4° | 4°°C 0 mm 0% 3 mph 94 % 1011 mb 0 mm/h
Tomorrow 12:00 am
Wetter-Symbol
4° | 4°°C 0 mm 0% 3 mph 95 % 1009 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€98,289.20
2.35%
Ethereum(ETH)
€3,131.68
2.83%
XRP(XRP)
€3.02
6.51%
Fesseln(USDT)
€0.96
-0.01%
Solana(SOL)
€230.68
-0.12%
Dogecoin(DOGE)
€0.337558
0.59%
USDC(USDC)
€0.96
0.01%
Shiba Inu(SHIB)
€0.000019
2.13%
Pepe(PEPE)
€0.000015
2.19%
Peanut das Eichhörnchen(PNUT)
€0.364266
-3.45%
Nach oben scrollen