Multistage Malware Attack Discovered by Kaspersky
Security company Kaspersky has uncovered a new type of malware that uses a multistage attack method.
The attackers conduct a phishing attack on the victim to deliver the first stage malware, which then communicates with a command-and-control server for the second stage malware. If the second stage malware acquires the necessary permissions, it will then execute the final stage malware.
What Makes this Malware Unique?
This malware’s multistage approach is unique because it allows attackers to avoid detection by anti-virus software. The first stage malware is relatively innocuous, so it may not be flagged by anti-virus programs. The second stage malware is only delivered once the attackers have gained access to the victim’s systems, making it even more difficult to detect.
Who is at Risk?
It’s not yet known who specifically is at risk from this malware. However, Kapersky has attributed the attack to a group known as “WildPressure.” They are largely focused on targets of political interest, particularly in the Southwestern Asia region.
Kaspersky has discovered a multistage malware attack that allows attackers to avoid detection by anti-virus software. The attackers conduct a phishing attack on the victim, which delivers the first stage malware. This communicates with a command-and-control server for the second stage malware, which only executes the final stage malware if it gains the necessary permissions. It is not yet known who is specifically at risk from this malware, but the attack has been attributed to a group focused on political targets in Southwestern Asia.
Original Article: https://www.infosecurity-magazine.com/news/crypto-wallets-attacked/