Neuer CMoon USB-Wurm zielt bei Datendiebstahl auf Russen

Teilen:

A new self-spreading worm named ‘CMoon,’ capable of stealing account credentials and other data, has been distributed in Russia since early July 2024 via a compromised gas supply company website.

According to Kaspersky researchers who discovered the campaign, CMoon can perform a broad range of functions, including loading additional payloads, snapping screenshots, and launching distributed denial of service (DDoS) attacks.

Judging from the distribution channel the threat actors used, their targeting scope is focused on high-value targets rather than random internet users, which indicates a sophisticated operation.

Distribution mechanism

Kaspersky says the infection chain begins when users click on links to regulatory documents (docx, .xlsx, .rtf, and .pdf) found on various pages of a company’s website that provides gasification and gas supply services to a Russian city.

The threat actors replaced the document links with links to malicious executables, which were also hosted on the site and delivered to the victims as self-extracting archives containing the original document and the CMoon payload, named after the original link.

“We have not seen other vectors of distribution of this malware, so we believe that the attack is aimed only at visitors to the particular site,” reports Kaspersky.

After the gas firm was notified of this compromise, the malicious files and links were removed from its website on July 25, 2024.

However, due to CMoon’s self-propagation mechanisms, its distribution may continue autonomously.

CMoon is a .NET worm that copies itself to a newly created folder named after the antivirus software it detected on the compromised device or one resembling a system folder if no AVs are detected.

The worm creates a shortcut on the Windows Startup directory to ensure it runs on system startup, securing persistence between reboots.

To avoid raising suspicions during manual user checks, it alters its files’ creation and modification dates to May 22, 2013.

The worm monitors for newly connected USB drives, and when any are hooked up on the infected machine, it replaces all files except for ‘LNKs’ and ‘EXEs’ with shortcuts to its executable.

CMoon also looks for interesting files stored on the USB drives and temporarily stores them in hidden directories (‘.intelligence’ and ‘.usb’) before these are exfiltrated to the attacker’s server.

CMoon features standard info-stealer functionality, targeting cryptocurrency wallets, data stored in web browsers, messenger apps, FTP and SSH clients, and document files in the USB or user folders that contain the text strings ‘secret,’ ‘service,’ or ‘password.’

An interesting and somewhat unusual feature is the targeting of files that might contain account credentials such as .pfx, .p12, .kdb, .kdbx, .lastpass, .psafe3, .pem, .key, .private, .asc, .gpg, .ovpn, and .log files.

The malware can also download and execute additional payloads, capture screenshots of the breached device, and initiate DDoS attacks on specified targets.

Stolen files and system information are packaged and sent to an external server, where they are decrypted (RC4) and verified for their integrity using an MD5 hash.

Kaspersky leaves open the possibility of more sites outside its current visibility distributing CMoon, so vigilance is advised.

No matter how targeted this campaign may be, the fact that the worm spreads autonomously means it could reach unintended systems and create the conditions for opportunistic attacks.

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
6:46 pm, Juni 21, 2025
Wetter-Symbol 30°C
L: 29° | H: 31°
overcast clouds
Luftfeuchtigkeit: 40 %
Druck: 1014 mb
Wind: 10 mph SE
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 87%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:43 am
Sonnenuntergang: 9:21 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
29° | 31°°C 0.73 mm 73% 10 mph 46 % 1014 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
16° | 26°°C 1 mm 100% 15 mph 78 % 1014 mb 0 mm/h
Mo. Juni 23 10:00 pm
Wetter-Symbol
15° | 23°°C 0.2 mm 20% 15 mph 81 % 1016 mb 0 mm/h
Di. Juni 24 10:00 pm
Wetter-Symbol
14° | 23°°C 0 mm 0% 13 mph 78 % 1016 mb 0 mm/h
Mi. Juni 25 10:00 pm
Wetter-Symbol
18° | 27°°C 0.38 mm 38% 11 mph 82 % 1013 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
27° | 30°°C 0 mm 0% 10 mph 40 % 1014 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
23° | 28°°C 0.73 mm 73% 7 mph 46 % 1014 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
19° | 23°°C 1 mm 100% 7 mph 65 % 1013 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
16° | 16°°C 0 mm 0% 10 mph 78 % 1013 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
17° | 17°°C 0 mm 0% 10 mph 67 % 1014 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
23° | 23°°C 0 mm 0% 12 mph 48 % 1014 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
26° | 26°°C 0 mm 0% 14 mph 33 % 1013 mb 0 mm/h
Tomorrow 4:00 pm
Wetter-Symbol
23° | 23°°C 0 mm 0% 15 mph 48 % 1012 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€89,635.17
0.38%
Ethereum(ETH)
€2,086.60
-0.21%
Fesseln(USDT)
€0.87
0.01%
XRP(XRP)
€1.82
0.05%
Solana(SOL)
€120.55
0.99%
USDC(USDC)
€0.87
-0.01%
Dogecoin(DOGE)
€0.138268
-0.34%
Shiba Inu(SHIB)
€0.000010
-1.02%
Pepe(PEPE)
€0.000009
-0.71%
Peanut das Eichhörnchen(PNUT)
€0.218233
13.10%
Nach oben scrollen