Sign In

Communications of the ACM

ACM TechNews

This Dangerous Keylogger Could Change the Entire Malware Space


View as: Print Mobile App Share: Send by email Share on reddit Share on StumbleUpon Share on Hacker News Share on Tweeter Share on Facebook
The malware's author updates and improves the key logger often.

The creator of Mass Logger has been quickly adding features to the keylogger in response to customer feedback.

Credit: Pixabay

Cofense Intelligence, a developer of “intelligent phishing defense solutions,” is raising concerns about a new keylogger because of how quickly the malware is updated.

According to Cofense, the creator of the Mass Logger keylogger, NYANxCAT, has been quickly adding features in response to customer feedback, with 13 updates seen over a recent three-week period.

Cofense detected a campaign that delivered an encrypted Mass Logger binary using an attached GuLoader executable.

Cofense also found NYANxCAT has incorporated advanced features into Mass Logger, such as its USB spreading capability and a function that allows cybercriminals to search for files with a specific file extension and exfiltrate them.

NYANxCAT indicated in patch notes that new targets were added for the keylogger's credential stealing functionality, and measures were taken to reduce automated detection.

Cofense said network admins should keep an eye out for FTP sessions or emails sent from local networks that do not conform to their organization's standards.

From TechRadar
View Full Article

 

Abstracts Copyright © 2020 SmithBucklin, Washington, DC, USA


 

No entries found