Trending

HomeBlog
Malicious Tools in the Underground: Investigating their Propagation
DarkWeb Malware Tools Blog

Malicious Tools in the Underground: Investigating their Propagation

Cyble Research & Intelligence Labs investigates the recent promulgation of Malicious Tools in underground forums.

CRIL continuously tracks and monitors the propagation of malicious activities across various cybercrime channels to highlight their use towards cybercrime activities. We identified some of these malicious activities recently being discussed by Threat Actors.

Trigona affiliate program

We identified a post inviting forum members to join the Trigona affiliate program. The Trigona ransomware family has been actively tracked since June 2022. Based on past reporting and analysis, the ransomware is written in Delphi programming language and uses 112-bit RSA and 256-bit AES encryption in OFB mode for file encryption. The ransomware operators claimed to perform double extortion attacks by combining data exfiltration with file encryption. Affiliates may be interested in expanding their operations as a result of this program.

The program offers ransomware-as-service (RaaS) and has multiple capabilities:

  • Cross-platform build with cryptographically advanced encryption
  • Admin panel Tor network, along with end-to-end encryption of data
  • Call facilities for countries across the globe
  • DDoS capabilities
  • Cloud storage for leaked databases
Figure 1: Trigona Affiliate Program

Meduza Stealer

The operators of Meduza stealer posted a thread advertising the functions of the stealer and details about the paid subscription. The build is developed in C++ and is designed to collect data from browsers, cryptocurrency wallets, browser history, bookmarks, Telegram clients, password managers, and cookies. The group formulated a Telegram channel on April 24, 2023, and has actively promoted its software build.

Figure 2: Meduza Stealer

ShadowVault – MacOS Stealer

The threat actors behind this new stealer targeting MacOS users were recently advertising it for subscription to the underground community. While Macs are relatively less bombarded with malware than Windows; however, they’re not immune. The threat actor enunciating its features describe that:

  • It can be installed via both PKG & DMG file formats.
  • The malware can extract cookie data, usernames, credit card information, crypto wallet ID, and passwords without requiring a separate crypto build.
  • It can extract the compromised information and gives the option to select/exclude and extract any file extension. It supports over 50 types of browsers, including Chromium browsers.
  • The extraction process is encrypted for stealing data from the keychain database of Apple devices, making it tedious to detect the amount of stolen information and evade detection.
  • The stealer supports extraction from Metamask, Coinomi, Binance, Coinbase, Atomic, Exodus, Keplr, Phantom, Trust, Tron Link, Martian, etc.
  • It features keylogging, creates multiple logs of the stolen information, and stores them in different locations to still extract the information even if deleted.
  • The stolen information automatically gets decrypted on the user’s computer.

The TA also offered custom signatures of legit Apple Developers for an additional fee.

report-ad-banner
Figure 3: ShadowVault – MacOS Stealer

LummaC2 Stealer

LummaC2 was first promoted on cybercrime forums in December 2022. Since then, it has been in consistent development and evolved to become a sophisticated but affordable information stealer malware among the other offerings in malware-as-a-service (MaaS). The malicious build, sized 150 – 200 KBs, was designed to steal data from multiple browsers, including Chrome, Chromium, Mozilla Firefox, Microsoft Edge, and Brave, among others targeting the latest Windows operating systems users from version 7 to 11.

The latest updates on LummaC2 suggested a security redesign, revamping modules for generating malicious builds and receiving stolen logs. It also included a new module with a load balancer.

The developers recently advertised their MaaS on another prominent Russian language forum that has been providing open ground for RaaS operators to advertise their affiliate and partnership programs.

Figure 4: LummaC2 stealer


Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.

Get Threat Assessment Report

Identify External Threats Targeting Your Business​
Free

Threat Landscape Reports 2025

Upcoming Webinars

CISO's Guide to Threat Intelligence 2024

CISO’s Guide to Threat Intelligence 2024: Best Practices

Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now

Share the Post:
Scroll to Top

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading