- Snake Keylogger seen in more than 280 million blocked infection attempts
- Malware uses advanced blur mechanics
- There are ways to defend the end points
Cybersecurity scientists from Fortinet have warned of a new, dangerous threat called Snake Keylogger.
This information -stealing piece of malware has been observed in more than 280 million infection trials blocked just by the solutions of the fort, which means the threat is widespread and the threat actors are throwing quite a wide network.
In his in -depth report, Fortinet says Snake Keylogger is most prevalent in China, Turkey, Indonesia, Taiwan and Spain, but added that its widespread presence highlights it as a global threat.
Advanced Development Techniques
Malware spreads primarily through phishing -e emails with malicious attachments and links and used to steal sensitive information from browsers such as Chrome, Edge or Firefox. In addition, Snake Keylogger can log keystrokes, capture credentials and monitor for clipboard activity. Finally, it uses SMTP (E -Mail) and Telegram Bots to Exfiltrate the information it steals.
What makes this malware particularly dangerous is its use of autoit for evasion, the Fortin explains further. By hiding malicious code within compiled autoit scripts, the threat actors make static analysis difficult and ensure that executable brands make it past traditional antivirus detection solutions.
However, there are ways to mitigate risks. Fortinet says users should be careful with incoming e -mail messages and should avoid opening unsolicited E -Mail -attached files or clicking unexpected links. In addition, users need to make sure their antivirus software is up to date and should also keep their other software patched up.
Finally, the Cyber Security Community should continue to work to improve the user awareness of topics such as phishing, social engineering and identity theft.
Keyloggers and Infostealers are dangerous pieces of malware as they give attackers keys to the kingdom, which can later be used in ransomware -attacks, extortion and more. In this particular case, the Fortin did not say who built keylogger or if they are usually targeted at a particular industry.
Via Infosecurity Magazine