News: 1729575014

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Pixel perfect Ghostpulse malware loader hides inside PNG image files

(2024/10/22)


The Ghostpulse malware strain now retrieves its main payload via a PNG image file's pixels. This development, security experts say, is "one of the most significant changes" made by the crooks behind it since launching in 2023.

The image file format is popularly used for web graphics and is often picked in preference to a lossy compression JPG file because it is a lossless format and retains key details such as smooth text outlines.

Elastic Security Labs' Salim Bitam noted that Ghostpulse is often used in campaigns as a loader for more dangerous types of malware such as the [1]Lumma infostealer , and that the latest change makes it even more difficult to detect.

[2]

Previous versions of Ghostpulse were also difficult to detect and used sneaky methods such as hiding payloads in a PNG file's IDAT chunk. However, it now parses the image's pixels, embedding the malicious data within the structure.

[3]

[4]

"The malware constructs a byte array by extracting each pixel's red, green, and blue (RGB) values sequentially using standard Windows APIs from the GdiPlus(GDI+) library," Bitam said. "Once the byte array is built, the malware searches for the start of a structure that contains the encrypted Ghostpulse configuration, including the XOR key needed for decryption.

"It does this by looping through the byte array in 16-byte blocks. For each block, the first four bytes represent a CRC32 hash, and the next 12 bytes are the data to be hashed. The malware computes the CRC32 of the 12 bytes and checks if it matches the hash. If a match is found, it extracts the offset of the encrypted Ghostpulse configuration, its size, and the four-byte XOR key, and then XOR decrypts it."

[5]

Ghostpulse is far from the first malware strain to [6]hide its malicious files within pixels . However, the finding speaks to the consistent craftiness exhibited by those behind it.

The technique goes hand-in-hand with the social engineering techniques used to download the file in the first place. Bitam said victims are tricked into visiting an attacker-controlled website and validating what appears to be a routine [7]CAPTCHA .

However, instead of checking a box or a series of images matching a prompt, victims are instructed to enter specific keyboard shortcuts that copy malicious [8]JavaScript to the user's clipboard. From there, a PowerShell script is run that downloads and executes the Ghostpulse payload.

[9]

McAfee recently spotted the same method being used to drop Lumma, but didn't reference Ghostpulse's involvement. Its researchers [10]noted that GitHub users were being targeted specifically using emails purportedly asking them to fix a non-existent security vulnerability.

The sophistication here is far greater than what the cybercriminals behind Ghostpulse demonstrated in early versions, which relied on victims downloading dodgy executables following SEO poisoning or malvertising efforts.

Using these techniques, the malware does a good job of evading simple, file-based malware scanning methods and, given how pervasive Lumma is among cybercriminals, it's a good idea to ensure defenses are ready to block it.

[11]Chinese chipmaker Loongson now just three to five years off the pace on the desktop

[12]Someone's tried sneaking semiconductor secrets out of South Korea's patent office

[13]Uncle Sam reportedly considers capping AI chip shipments to Middle East

[14]China reportedly tells local AI buyers to ignore Nvidia

Cyfirma's experts [15]describe Lumma as a "potent" and "sophisticated" malware-as-a-service offering that's been around since 2022. It targets all kinds of data including sensitive types and sources such as cryptocurrency wallets, web browsers, email clients, and two-factor authentication browser extensions.

According to Darktrace, access to Lumma can be purchased for as little as $250 – a price that can rise to $20,000 for the source code.

It's often distributed via trojanized downloads for popular software, and the myriad campaigns using it have posed as various organizations from ChatGPT to [16]CrowdStrike just days after its update nightmare.

"Mirroring the general emergence and rise of information stealers across the cyber threat landscape, Lumma stealer continues to represent a significant concern to organizations and individuals alike," Darktrace [17]said .

Reg readers may also remember that Lumma was also fingered as one of the infostealers that exploited a Google zero-day to [18]maintain access to compromised accounts even after passwords were changed.

If you implemented the YARA rules Elastic released last year, these will still be enough to keep your organization safe from the malware's final infection stage, Bitam said, although it recently [19]released some updated ones to catch Ghostpulse in the act sooner.

"In summary, the Ghostpulse malware family has evolved since its release in 2023, with this recent update marking one of the most significant changes," said Bitam. "As attackers continue to innovate, defenders must adapt by utilizing updated tools and techniques to mitigate these threats effectively." ®

Get our [20]Tech Resources



[1] https://www.theregister.com/2024/07/25/crowdstrike_lumma_infostealer/

[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_specialfeatures/cybersecuritymonth&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2Zxd3yEx1tDYrMVKhYc6qFwAAARc&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_specialfeatures/cybersecuritymonth&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Zxd3yEx1tDYrMVKhYc6qFwAAARc&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_specialfeatures/cybersecuritymonth&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33Zxd3yEx1tDYrMVKhYc6qFwAAARc&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_specialfeatures/cybersecuritymonth&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Zxd3yEx1tDYrMVKhYc6qFwAAARc&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[6] https://www.theregister.com/2014/12/11/your_data_stolen_through_pixels/

[7] https://www.theregister.com/2024/07/24/googles_recaptchav2_labor/

[8] https://www.theregister.com/2024/09/17/oracle_urged_to_surrender_javascript_trademark/

[9] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_specialfeatures/cybersecuritymonth&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33Zxd3yEx1tDYrMVKhYc6qFwAAARc&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[10] https://www.mcafee.com/blogs/other-blogs/mcafee-labs/behind-the-captcha-a-clever-gateway-of-malware/

[11] https://www.theregister.com/2024/10/21/loongson_3b6600_desktop_tease/

[12] https://www.theregister.com/2024/10/18/korea_ip_theft/

[13] https://www.theregister.com/2024/10/16/us_export_cap_ai_chip_middle_east/

[14] https://www.theregister.com/2024/10/08/asia_in_brief/

[15] https://www.cyfirma.com/research/lumma-stealer-tactics-impact-and-defense-strategies/

[16] https://www.theregister.com/2024/07/25/crowdstrike_lumma_infostealer/

[17] https://darktrace.com/blog/the-rise-of-the-lumma-info-stealer

[18] https://www.theregister.com/2024/01/02/infostealer_google_account_exploit/

[19] https://www.elastic.co/security-labs/tricks-and-treats

[20] https://whitepapers.theregister.com/



I'm confused...

Neil Barnes

For one horrible moment there I though that some idiot had decided that PNG files were executables. Now I read it a second time, I see that the nasty is in the remote script - I assume Windows only - run by the duped user.

Re: I'm confused...

Jusme

> For one horrible moment there I though that some idiot had decided that PNG files were executables. Now I read it a second time, I see that the nasty is in the remote script - I assume Windows only - run by the duped user.

Exactly. Sounds to me like the 'PNG' angle is just the command channel to an already compromised host, not an attack vector. Won't stop the dibbles banning PNG files in the usual exit-horse-door-bolting exercise though.

Re: I'm confused...

ibmalone

Fun aside, back in the days when I spent time trying to help with Ogg Vorbis metadata (there's a limit to the value you can add when people like Chris Montgomery are doing the heavy lifting), one suggestion that arrived from outside the regular developers was to add a field that would cause a command to be run. It was obviously gently but very firmly rejected. I didn't (and don't) think it was made maliciously, just someone who had some idea for a thing they thought would be cool and had in absolutely no way thought it out fully.

"defenders must adapt by"

Pascal Monett

. . using their brain.

I'm supposed to click on some link and enter keyboard shortcuts instead of a normal CAPTCHA ?

First of all, I'm going to check out that link. If you say you're from Microsoft and you sent me the mail from a gmail account, you're out. If you manage to spoof the microsoft account, the I want to see the link going to website that has the word microsoft in it. If it doesn't, you're out. Finally, I'm not going to do CTRL-C on a CAPTCHA. You're out.

Use your brain, people.

Re: "defenders must adapt by"

Spazturtle

You don't press CTRL-C, the website has navigator.clipboard.writeText() on the submit button so that when you press submit it copies the code to you clipboard.

Then once you have clicked submit a box pops up asking you to press Windows key + R and then CTRL-V.

Re: "defenders must adapt by"

ITMA

These are, you know, "users" we're talking about.

The ones who receive unexpected emails from people they don't know with attachments (or links) which they open "to see what they are".

Despite being repeatedly told not to.

Lord Elpuss

Fuck me that's a clever bit of software engineering.

If the developers used their talents for good they could do something amazing. Rather than just being - well, you know. Pointless criminal scum.

The great Tao flows everywhere, both to the left and to the right.
The ten thousand things depend upon it; it holds nothing back.
It fulfills its purpose silently and makes no claim.
It nourishes the ten thousand things,
And yet is not their lord.
It has no aim; it is very small.
The ten thousand things return to it,
Yet it is not their lord.
It is very great.

It does not show greatness,
And is therefore truly great.