• Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

My AntiSpyware

Free antispyware software, Online Scanners, Instructions on how to remove spyware and malware.

Menu
  • Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools
Home › Malware › WhiskerSpy Backdoor Malware – How the Malware Works (Virus removal guide)

WhiskerSpy Backdoor Malware – How the Malware Works (Virus removal guide)

Myantispyware team February 20, 2023     No Comment    

A new backdoor malware named WhiskerSpy has been identified by cybersecurity researchers. The malware was used in a watering hole attack (https://en.wikipedia.org/wiki/Watering_hole_attack), which involves targeting individuals who visit a specific website, in this case, a pro-North Korea site. The campaign was carried out by Earth Kitsune, a relatively new advanced threat actor that has been known for targeting individuals with an interest in North Korea.

New WhiskerSpy malware detection names

The researchers found that the threat actor targeted visitors to the website from Shenyang, China, Nagoya, Japan, and Brazil. It is believed that Brazil was used only for testing the watering hole attack using a VPN connection, and the real targets were visitors from the two cities in China and Japan.

How does the malware work

WhiskerSpy is a backdoor malware that was delivered through a watering hole attack, which involves targeting individuals who visit a specific website. Here’s a step-by-step breakdown of how the malware works:

  1. The threat actor identifies a pro-North Korea website and compromises it.
  2. The attacker injects a malicious script into the website that asks visitors to install a video codec to watch videos on the site.
  3. The attacker modifies a legitimate codec installer to load the backdoor malware onto the victim’s system.
  4. When the victim tries to install the codec, the malware is executed and installs itself on the victim’s system as a shellcode.
  5. The malware uses two persistence techniques to ensure it remains active on the victim’s system:
    • It abuses the native messaging host in Google Chrome and installs a malicious Google Chrome extension called Google Chrome Helper. This extension allows the payload to execute every time the browser starts.
    • It leverages OneDrive side-loading vulnerabilities to drop a malicious file called “vcruntime140.dll” in the OneDrive directory.
  6. Once installed, WhiskerSpy periodically connects to a command and control (C2) server using a 16-byte AES key for encryption.
  7. The C2 server provides updates and instructions to the malware, such as executing shell commands, injecting code into another process, exfiltrating specific files, or taking screenshots.
  8. The backdoor gives remote operators access to the victim’s system, including the ability to execute shell commands, upload or download files, take screenshots, and inject shellcode into a process.

Overall, the attacker used a tried and tested method of a watering hole attack to target individuals with an interest in North Korea. They used a modified legitimate codec installer to deliver WhiskerSpy, a backdoor malware that provides the attacker with remote access to the victim’s system. The malware uses persistence techniques to ensure it remains active on the victim’s system and periodically connects to a C2 server for updates and instructions.

Although the researchers are moderately confident in attributing this attack to Earth Kitsune, the targets and modus operandi are similar to activities previously associated with the group. The researchers urge individuals and organizations to be vigilant and take appropriate measures to secure their systems against such attacks.

Threat Summary

Name WhiskerSpy
Type Backdoor malware
Related files Modified codec installer, MSI executable, Google Chrome extension “Google Chrome Helper”, OneDrive file “vcruntime140.dll”
Detection names Backdoor.Agent.WhiskerSpy, Backdoor.BDS/Agent.kiixf, Trojan/Win32.Sabsik, A Variant Of Win64/Agent.BYU, Backdoor.Win32.Agent.myuhrz, RDN/Generic BackDoor, Backdoor.Win64.WHISPERSPY.A, Trojan:Win32/Tiggre!rfn
Distribution Watering hole attack through a compromised pro-North Korea website
Symptoms Unusual codec installation prompts, malicious Google Chrome Helper extension, suspicious OneDrive file
Damage Allows remote access to victim’s system, can execute shell commands, upload/download files, take screenshots, inject shellcode into a process, etc.
Removal Use a reputable antivirus or antimalware software to scan and remove the malware; delete any suspicious files or extensions on the system; take steps to improve system security, such as updating software and using strong passwords.

Examples of malicious programs

On the Internet, users can come across many malicious programs that perform various malicious actions. Among them there are such as WlndowsDraiver Virus, Altruistics Virus, Winlogson.exe malware, Trojan Wacatac, although, of course, there are many more. Some of them collect user data, others install malware on computers, and still others add infected computers to botnets, and so on. In any case, each malicious program (adware, browser hijacker, trojan, worm, …) is a huge threat to both user privacy and computer security. Therefore, malicious programs must be removed immediately after detection; using an infected computer is very dangerous.

Finish words

Here are some final recommendations to prevent infection from the WhiskerSpy and other malware:

Keep your operating system and software up to date

Regularly check for updates to your operating system and other software to ensure that you have the latest security patches and features.

Use a reputable antivirus software

Install and regularly update antivirus software to help protect your system from malware.

Be cautious of suspicious emails and downloads

Avoid opening emails from unknown or untrusted sources, and only download software from reputable sources.

Be mindful of what you click

Avoid clicking on links or downloading attachments from suspicious emails or websites.

Use a strong password

Use a strong, unique password for all of your accounts and change them regularly.

Enable firewalls

Enable firewalls on all of your devices to help prevent unauthorized access to your system.

Regularly back up your data

Regularly back up your important data to prevent data loss in case of malware infection or other system failure.

By following these recommendations, you can help protect your computer from WhiskerSpy and other malware, and keep your personal and financial information secure. If you need more help with WhiskerSpy malware related issues, go to here.

Malware

Author: Myantispyware team

Myantispyware is an information security website created in 2004. Our content is written in collaboration with Cyber Security specialists, IT experts, under the direction of Patrik Holder and Valeri Tchmych, founders of Myantispyware.com.

Leave a Reply Cancel reply




New Guides

Yourcoolwords.com Click Allow Scam
Yourcoolwords.com Virus Removal Guide
Adventureorganic.com Click Allow Scam
Adventureorganic.com Virus Removal Guide
retellrule.com website
Retellrule.com Review: A Scam or Legit Online Store?
Search-Alpha.com
Search-Alpha.com redirect (Virus removal guide)
Jyos ransomnote
How to remove Jyos ransomware, Decrypt .Jyos files.

Follow Us

Search

Useful Guides

Files encrypted by ransomware become useless
How To Recover Encrypted Files (Ransomware file recovery)
DNSChanger
How to remove DNSChanger malware virus [Updated Apr. 2018]
How to reset Internet Explorer settings to default
How to remove browser hijacker virus (Chrome, Firefox, IE, Edge)
Malwarebytes won’t install, run or update – How to fix it

Recent Posts

red flags
Your Apple ID has been locked Scam Text Onlinehome.us
Look Who Died Scam Facebook Message
Look Who Died in an Accident Scam On Facebook Messenger and TikTok
Cooldatingplace.top Click Allow Scam
Cooldatingplace.top Virus Removal Guide
Mishapideal.com malicious
Mishapideal.com pop-up redirect (Virus removal guide)
Iowd rnasomnote
How to remove Iowd ransomware, Decrypt .iowd files.

MYANTISPYWARE.COM

  • About Us
  • Contact Us
  • Privacy Policy

NEED A HELP ?

If you're seeing unwanted pop-ups or ads in your web-browser, you might have an adware installed on your computer. Use the following guide to stop pop-up ads and remove malicious software. Or ask for help here.

Links

  • Downloads
  • Instructions
  • Questions and Answers
  • Free Malware Removal Tools
Copyright © 2004 - 2023 MASW - Myantispyware.com.