Python Snake Info Stealer Spreading Via Facebook Messages
2024-3-21 15:0:31 Author: securityboulevard.com(查看原文) 阅读量:5 收藏

As per recent reports, threat actors are increasingly leveraging Facebook messages to distribute the Python Snake Info Stealer malware. Researchers have noticed that threat actors are using three variants of the information stealer. It’s worth mentioning here that two of these installers are regular Python scripts, whereas the third is an executable that is assembled using the PyInstaller. 

In this article, we’ll dive into all the details of the Python Snake Info Stealer attacks, learning how the attack is initiated and what safety measures can be adopted. 

Let’s begin!

Origins of the Python Snake Info Stealer


Details about the
information stealing malware first appeared on the social media platform X, formerly known as Twitter, in August 2023. The details provide valuable information on how the Python Snake info stealer operates and are essential to preventing data breaches and cyber attacks via social media platforms


Python Snake Malware Distribution 


As per recent reports, the
Python Snake info stealer attacks are carried out in multiple stages. To initiate the attacks, threat actors send target users “.RAR” or “.ZIP” files using Facebook messages. The infection sequence begins once the user downloads and opens these files. 

It’s worth mentioning here that the files mentioned above contain two downloaders: a batch script and a cmd script. The cmd script is used for downloading the Python Snake info stealer from a threat actor controlled GitLab repository onto the user’s system. Researchers at Cybereason, who first warned of the attacks, have stated that: 

“The archived file contains a BAT script which is the first downloader initiating the infection chain. The BAT script attempts to download a ZIP file via the cURL command, placing the downloaded file under the directory C:\Users\Public as myFile.zip. The BAT script proceeds to spawn another PowerShell command Expand-Archive to extract the CMD script vn.cmd from the ZIP file and proceeds with its infection.”


Malicious Python Scripts and The Information Stealing Malware 


Reports have mentioned that the
“vn.cmd” script is the primary script responsible for downloading the Python Snake info stealer. The script launches the Google Chrome browser, opens up the homepage of AliBaba.com, and then proceeds to download the remaining three files from GitLab as follows: 

  1. WindowsSecure.bat – used for maintaining persistence on the targeted device by launching and executing project.py.
  2. Document.zip – contains Python packages and aids in launching project.py, allowing threat actors to avoid the need to have such packages installed on the user’s device.
  3. Project.py – the Python script responsible for stealing credentials from different browsers.

The script essentially aims to target seven web browsers, which include: 

  • Brave
  • Coc Coc Browser
  • Chromium
  • Google Chrome Browser
  • Microsoft Edge
  • Mozilla Firefox
  • Opera Web Browser

It uses the “main []” function to dump relevant information from the browser onto the disk. In addition to collecting cookies and credentials, information stealing malware also dumps cookie information that’s specific to Facebook, titled “cookiefb.txt.” This allows the threat actors to hack the victim’s Facebook account and expand their attack surface.

Python Snake Attack Severity 


As far as the severity of the attacks is concerned, it’s worth mentioning here that all three variants do not need
Python packages to be installed on the victims’ devices for them to execute their malicious intent. 

However, where variant one targets seven web browsers, variants two and three are known to target the following: 

  • Coc Coc Browser
  • Google Chrome Browser
  • Microsoft Edge
  • Facebook Cookies

As of now, researchers have attributed the campaign to those threat actors of Vietnamese origin. Their basis for such claims lies within comments in the scripts, naming conversations, and the presence of the Coc Coc Browser.

These attacks serve as a stark reminder pertaining to the dangers of the ever-evolving cyber threat landscape and dictate that proactive measures for preventing data breaches must be adopted to safeguard organizational and personal networks. 


Conclusion 


The
Python Snake info stealer malware is being distributed through Facebook messages containing files that, if downloaded, execute malicious Python scripts. The malware targets different web browsers and aims to steal credentials. Its severity serves as a stark reminder of why implementing robust cybersecurity measures is paramount in the digital age! 

The sources for this piece include articles in The Hacker News and TechRadar Pro.

The post Python Snake Info Stealer Spreading Via Facebook Messages appeared first on TuxCare.

*** This is a Security Bloggers Network syndicated blog from TuxCare authored by Wajahat Raja. Read the original post at: https://tuxcare.com/blog/python-snake-info-stealer-spreading-via-facebook-messages/


文章来源: https://securityboulevard.com/2024/03/python-snake-info-stealer-spreading-via-facebook-messages/
如有侵权请联系:admin#unsafe.sh