Check us out on Instagram

Cyber Society

DarkGate Malware Attacks Skype Accounts

DarkGate Malware Attacks Skype Accounts

DarkGate Malware Attacks Skype Accounts
byDarsh Poddaron Oct 16, 2023
StayInformed
DarkGateMalware

DarkGate Malware Strikes Again

In the clandestine world of cyber warfare, the months spanning from July to September have borne witness to a resurgent DarkGate malware, employing compromised Skype accounts as its nefarious conduit. Craftily concealed within seemingly innocent messages are VBA loader script attachments, serving as the Trojan horse.

Unmasking DarkGate's Sinister Plot

The vigilant eyes of Trend Micro's security researchers uncovered this sinister plot, revealing the deployment of a secondary AutoIT script, purpose-built to usher in the ultimate DarkGate malware payload. The consequence: an open door to digital chaos.

The Mystery of Account Infiltration

How did these perpetrators infiltrate victims' Skype accounts? The answer remains shrouded in mystery, but a likely scenario involves leaked credentials from underground forums or prior compromises within parent organizations.

Expanding the Target Horizon

The audacity of DarkGate's operators didn't stop there. Their gaze shifted to Microsoft Teams, targeting organizations with open gates for external messages. Teams phishing campaigns have been well-documented, employing malicious VBScript to propagate DarkGate malware. It was a calculated ploy, with malicious actors exploiting compromised Office 365 accounts and a tool known as "TeamsPhisher" to bypass restrictions and deliver deceitful attachments.

DarkGate's Multifaceted Threat

The end game for these cybercriminals is as diverse as it is ominous, ranging from ransomware to cryptomining. This multifaceted approach hinges on the specific DarkGate variant acquired or leased by threat groups, a fact uncovered by Trend Micro's telemetry.

DarkGate's Resurgence and Its Treacherous Tools

The surge of DarkGate's prominence can be attributed to the disruption of the Qakbot botnet, a pivotal event resulting from international collaboration. Before Qakbot's fall, an individual claiming to be DarkGate's developer appeared on a hacking forum, offering subscriptions at a staggering annual fee, reaching up to $100,000.

DarkGate's Arsenal of Malice

DarkGate malware promised a treasure trove of treacherous tools, including a concealed VNC, the ability to evade Windows Defender, a browser history theft mechanism, an integrated reverse proxy, a file manager, and even a Discord token-stealing capability. The aftermath of this revelation led to a discernible uptick in DarkGate infections via various delivery methods, including phishing and malvertising.

The Growing Influence of DarkGate

This recent surge underscores the growing influence of DarkGate as a malware service operation, firmly establishing its presence within the cybercriminal sphere, and highlighting the unyielding determination of threat actors, who adapt their strategies in the face of disruptions and challenges.

The Responsibility of Cybersecurity

Remember, cybersecurity is everyone's responsibility, whether you're a technical expert or a non-technical user. Stay tuned for more updates on staying safe in the digital world.