New BunnyLoader Malware Variant Surfaces with Modular Attack Features
https://thehackernews.com/2024/03/new-bunnyloader-malware-variant.html #Cybercrime #Malware #BunnyLoader
New BunnyLoader Malware Variant Surfaces with Modular Attack Features

New threat: BunnyLoader 3.0 malware variant emerges with advanced modules for data theft, keylogging, and evasion tactics.

The Hacker News

🚨 New threat: #BunnyLoader 3.0 #malware variant emerges with advanced modules for data theft, keylogging, and evasion tactics.

https://thehackernews.com/2024/03/new-bunnyloader-malware-variant.html

#cybersecurity #hacking

New BunnyLoader Malware Variant Surfaces with Modular Attack Features

New threat: BunnyLoader 3.0 malware variant emerges with advanced modules for data theft, keylogging, and evasion tactics.

The Hacker News
BunnyLoader 3.0 surfaces in the threat landscape - Security Affairs

Researchers found a new variant of the BunnyLoader malware with a modular structure and new evasion capabilities.

Security Affairs

Another day, another cybersecurity threat - BunnyLoader 3.0 aims at your login credentials, crypto and more!

https://hackread.com/bunnyloader-3-0-malware-steals-credentials-crypto/
via @HackRead
#CyberSecurity #BunnyLoader #Malware #Crypto

New Malware "BunnyLoader 3.0" Steals Credentials and Crypto

Follow us on Twitter (X) @Hackread - Facebook @ /Hackread

Hackread - Latest Cybersecurity, Tech, Crypto & Hacking News
BunnyLoader, a new Malware-as-a-Service advertised in cybercrime forums

Cybersecurity researchers spotted a new malware-as-a-service (MaaS) called BunnyLoader that's appeared in the threat landscape.

Security Affairs
BunnyLoader Malware Targets Browsers and Cryptocurrency - RedPacket Security

Zscaler ThreatLabz has identified a newly emerging Malware-as-a-Service (MaaS) threat known as "BunnyLoader," available on underground forums. The tool,

RedPacket Security
New BunnyLoader threat emerges as a feature-rich malware-as-a-service

Security researchers discovered a new malware-as-a-service (MaaS) named 'BunnyLoader' advertised on multiple hacker forums as a fileless loader that can steal and replace the contents of the system clipboard.

BleepingComputer

Once installed, the malware establishes persistence through a Windows Registry change and undergoes sandbox and virtual machine checks before executing its malicious behavior.

#BunnyLoader #Cybersecurity #Malware #Cyberthreat #MaaS #GitHub

https://cybersec84.wordpress.com/2023/10/02/new-malware-as-a-service-threat-bunnyloader-emerges-in-the-cybercrime-underground/

New Malware-as-a-Service Threat BunnyLoader Emerges in the Cybercrime Underground

Cybersecurity researchers have recently uncovered a new malware-as-a-service (MaaS) threat known as BunnyLoader, which is being advertised for sale on the dark web. According to an analysis by Zsca…

CyberSec84 | Cybersecurity news.

"🐰 BunnyLoader Unleashed: The Newest Kid on the Malware Block 🐰"

In a recent discovery, Zscaler ThreatLabz stumbled upon a new Malware-as-a-Service (MaaS) threat named "BunnyLoader" being peddled on various forums. This nefarious service offers a plethora of malicious functionalities including downloading and executing a second-stage payload, pilfering browser credentials and system information, keylogging, and even cryptocurrency theft through clipboard manipulation. πŸ•΅οΈβ€β™€οΈπŸ’»

The malware, written in C/C++, is sold for a lifetime price of $250 and is under rapid development with multiple feature updates and bug fixes. It employs various anti-sandbox techniques during its attack sequence to evade detection and has a fileless loader feature which executes further malware stages in memory. BunnyLoader's C2 panel allows the threat actor to control infected machines remotely, showcasing a list of various tasks including keylogging, credential theft, and remote command execution among others. πŸ›‘πŸ”

The detailed technical analysis reveals how BunnyLoader maintains persistence, performs anti-VM techniques, registers with the C2 server, and executes its core malicious tasks. The malware also harbors a clipper module to replace cryptocurrency addresses in a victim's clipboard with addresses controlled by the threat actor, targeting multiple cryptocurrencies like Bitcoin, Ethereum, and Monero. πŸͺ™πŸ’Έ

The article is a comprehensive dive into the technical intricacies of BunnyLoader, shedding light on its modus operandi and the potential threat it poses to individuals and organizations alike. πŸ§πŸ”

Source: Zscaler ThreatLabz

Tags: #BunnyLoader #MalwareAsAService #CyberSecurity #ThreatAnalysis #Malware #CryptocurrencyTheft #Zscaler #ThreatLabz #InfoSec

Authors: NIRAJ SHIVTARKAR, SATYAM SINGH

BunnyLoader, the newest Malware-as-a-Service

BunnyLoader features rapid iterations, anti-sandbox tactics, second-stage payload executions, keylogging, stealing capabilities, and remote execution.

BunnyLoader: New Malware-as-a-Service Threat Emerges in the Cybercrime Underground https://thehackernews.com/2023/10/bunnyloader-new-malware-as-service.html?m=1 #malware #bunnyloader
BunnyLoader: New Malware-as-a-Service Threat Emerges in the Cybercrime Underground

BunnyLoader, the latest malware-as-a-service, is up for sale in the dark web. It can steal your data, replace your crypto address

The Hacker News