Jump to content

Rietspoof malware spreads via Facebook Messenger and Skype spam

The AchieVer

Recommended Posts

Rietspoof malware spreads via Facebook Messenger and Skype spam

Avast researchers spot new malware spreading via instant messaging clients.

Malware: The "Most Wanted" list

Avast security researchers have discovered a new malware strain named Rietspoof that's currently being spread to victims via instant messaging clients such as Facebook Messenger and Skype.

In a report published over the weekend, researchers described this new threat as a "multi-stage malware," that was first spotted in August 2018, but which was largely ignored until a noticeable uptick in distribution efforts last month.

Rietspoof's main role is to infect victims, gain persistence on infected hosts, and then download other malware strains --depending on the orders it receives from a central command & control (C&C) server.

Persistence is gained by the malware by placing an LNK (shortcut) file in the Windows /Startup folder. This is a noisy operation because most antivirus products know to keep an eye on this folder, but Avast says Rietspoof is also signed with legitimate certificates, allowing the malware to bypass security checks.

The infection routine is made up of four different stages --described in greater detail in the Avast write-up here. The actual Rietspoof malware is dropped in stage three, with the last stage being reserved for downloading a more intrusive and potent malware strain.

Rietspoof is what security researchers call a "dropper" or "downloader," a malware strain designed for the sole purpose of infecting victims with "something stronger."

Because of this, it's functionality is also very limited. It can download, execute, upload, and delete files, and, in case of emergencies, it can also delete itself. Nonetheless, these are more than enough for Rietspoof to do its job.

Avast says that since it began looking into this new threat, the malware has changed its C&C communication protocol, and has gone through other smaller modifications, which made researchers believe that it's still under active development.

"Our research still cannot confirm if we've uncovered the entire infection chain," said researchers on Saturday.

Rietspoof is the second "malware dropper/downloader" that has been seen picking up in activity in the past few months. The other one is named Vidar, a malware strain that has been helping various criminal gangs distribute ransomware and password stealers. An analysis of the Vidar malware is available here.




Link to comment
Share on other sites

  • Views 320
  • Created
  • Last Reply


This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Create New...