Tuesday, October 27, 20:42
Home security Chinese hackers use Koronovi for malware attacks!

Chinese hackers use Koronovi for malware attacks!

Chinese hacker-pandemic Koronovi-windowsResearchers have discovered a new one campaign COVID-19 behind which Chinese hackers are executing APT and take advantage of the fear and confusion that the Koronovian pandemic has caused them to carry malware on Windows. This hacking attack, believed to have been launched by a longtime hacker group that executes APT targeting various government and private entities, exploits the pandemic of Coronavirus to infect targeted victims. The attackers are also using new hacking tools in this campaign to attack the suspicious RTF documents.

Evidence of this hacker attack reveals that the RTF documents are equipped with Royal Road, an RTF "weapon" so named by the Anomaly. It is sometimes called "8.t RTF exploit builder" and is mainly used to exploit any vulnerabilities. processor its equations Microsoft Word.

Some of the malicious documents are written in Mongolian. One of them, which refers to the Ministry of Foreign Affairs of Mongolia, contains information on the news outbreaks Coronavirus. It is worth noting that this cyberattack was not only aimed at the Mongolian Foreign Ministry, but was extended to other countries such as Ukraine, Russia and Belarus.hackers and coroner documents

But how does this attack work?

As soon as the targeted victim opens the malicious RTF document, the hackers will take advantage of a Microsoft Windows Word vulnerability and the new file named intel.wll will be injected into Word's startup folder.

After that, when Microsoft Word starts on the infected computer, all DLLs with WLL extension in the Word startup folder start. According to Checkpoint, like many malware, it downloads more malware - in which case it downloads and decrypts one RAT module, also in the form of a DLL file and loads it into memory.

The RAT module used by hackers in this attack can do screenshots on the victim's computer screen, which he sends to hackers. It can also list files and directories, create or delete directories as well as move, delete, or download files.


Please enter your comment!
Please enter your name here



Data breach in a law firm exposes data of Google employees

Immigration law firm Fragomen, Del Rey, Bernsen & Loewy, LLP revealed that it suffered a data breach that led to the leakage of personal data ...

How to install a .watchface file on Apple Watch

The Apple Watch lets you customize the faces of the watch to display all kinds of useful information. But did you know ...

The five biggest data breaches of the 21st century

Data is becoming more and more sought after as our daily lives become more digitized. The technology giants that monopolize data are ...

Microsoft is limiting the availability of Windows 10 20H2

Microsoft is currently restricting the availability of Windows 10 20H2 to provide all users who want to ...

How to enable the new Chrome Read more feature

The latest version of Google Chrome browser, v86, released earlier this month, contains a secret feature called Read ...

How to choose a custom color for the Start menu

Starting with the October 2020 update, Windows 10 is the default on a theme that removes bright colors from ...

NASA telescope discovers drinking water on the moon

Eleven years ago, a spacecraft changed our view of the moon forever. The data collected by ...

Microsoft: Enhances password spray attack detection capabilities

Microsoft has significantly improved the ability to detect password spray attacks in the Azure Active Directory (Azure AD) and has reached the point ...

How to prevent companies from finding our phone number

In the age of advertising, the more user information is known the more convenient it is for companies. And in particular, the ...

Violation in a psychotherapy clinic led to blackmail of patients

Two years ago, a cyber attack took place in a Finnish psychotherapy clinic, which resulted in data theft and ransom demand. Now,...