Ultimately #asyncrat and #hvnc:
mathewhvnc.twilightparadox\.com
kjhvnc.duckdns\.org
rtasyn.duckdns\.org
asyncyam.twilightparadox\.com
Been keeping an eye on this registrant registering DGA domains used for #socgholish payloads for a minute and noticed recently they were registering names outside of the usual random format.
These follow a pattern typical of their other next-stage payload servers where they redirect to Google if you navigate to the root dir:
getazurecommand[.]icu
azuregetrequest[.]icu
get-azurecommand[.]icu -> 67.217.228[.]186
azure-getrequest[.]icu -> 64[.]52.80.211
However these host a login page for an #hvnc service called #hvnc_blazor :
testmyws24[.]top -> 23.163.0[.]56
newrelayws24[.]top -> 5.161.234[.]18
testmyrelay[.]top
ws2424[.]top -> 168.100.11[.]52
La empresa de ciberseguridad israelí Guardz identifica el nuevo malware hVNC para macOS
#malware #macOS #hvnc #CyberSecurity #Guardz
https://mecambioamac.com/guardz-identifica-el-nuevo-malware-hvnc-de-macos/
The previously undetected LOBSHOT malware is distributed using Google ads and gives operators VNC access to Windows devices. Researchers from Elastic Security Labs spotted a new remote access trojan dubbed LOBSHOT was being distributed through Google Ads. Threat actors are using an elaborate scheme of fake websites through Google Ads to spread their malware, the […]