Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

IBM Warns of New CoreBot Stealer

Researchers at IBM have come across a new piece of malware designed to steal sensitive information from infected computers.

Researchers at IBM have come across a new piece of malware designed to steal sensitive information from infected computers.

The new threat, dubbed “CoreBot” because its developer named the compiled malware file “core,” is delivered via a dropper that exits as soon as it executes CoreBot on the infected machine. Then, the stealer sets up a key in the Windows Registry to maintain persistence.

CoreBot uses a modular plugin system to allow its creator to easily add new data theft capabilities. The modules are downloaded from the malware’s command and control (C&C) server and loaded using a special export function from the plugin’s DLL.

According to IBM, CoreBot is currently capable of stealing passwords saved locally by web browsers, but it’s unable to intercept data in real time from such applications. The threat also targets FTP clients, email clients, cryptocurrency wallets, private certificates, and data from various desktop apps.

CoreBot has a domain generation algorithm (DGA), which is uncommon for information stealers, but the malware doesn’t leverage it yet. A DGA can be highly useful because it allows the malware to communicate with its C&C servers through dynamically generated domains. This makes it more difficult for security firms to disrupt the operation, and it prevents other cybercriminals from hijacking the botnet.

“In CoreBot’s case, the DGA parameters appear to generate different domains for geographical zones of the botnet and for groups of bots defined by the botmaster — a rather interesting concept for malware that is merely a generic stealer,” Limor Kessem, cybersecurity evangelist at IBM, explained in a blog post.

While CoreBot has a DGA in place, the threat currently communicates with two predetermined domains: vincenzo-sorelli[.]com and arijoputane[.]com — both apparently registered by a Russia-based individual.

In addition to stealing data, CoreBot is capable of downloading and executing other threats using Windows PowerShell.

Advertisement. Scroll to continue reading.

While information stealers pose a significant threat to regular users, they can be even more damaging when they end up on corporate endpoints. Malware such as CoreBot can harvest information that allows malicious actors to infiltrate an organization and steal its valuable files.

“It is important to keep in mind that Trojan operators will typically exfiltrate confidential business data like customer information, budget plans or even confidential insider information. Therefore, even a few infected endpoints inside the organization can end in very significant data security consequences,” Kessem explained.

IBM has pointed out that while CoreBot is not particularly sophisticated, such malware can easily evolve into a more dangerous threat. The company advises organizations to defend themselves against such malware by supplementing employee awareness with security solutions that can block malware at the exploitation or launch stage, and products that prevent malware that is already on the endpoint from exfiltrating data.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

DARPA veteran Dan Kaufman has joined Badge as SVP, AI and Cybersecurity.

Kelly Shortridge has been promoted to VP of Security Products at Fastly.

After the passing of Amit Yoran, Tenable has appointed Steve Vintz and Mark Thurmond as co-CEOs.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.