Latest Version of Hijack Loader Malware Utilizes Process Hollowing and UAC Bypass
In the ever-evolving landscape of cybersecurity threats, the emergence of a newer version of the malware loader, Hijack Loader, has sent ripples across the industry. This updated iteration comes equipped with a sophisticated arsenal of anti-analysis techniques, designed to cloak its activities and evade detection for prolonged periods.
According to Zscaler ThreatLabz researcher Muhammed Irfan V A, these enhancements aim to enhance the malware's stealthiness, making it increasingly challenging for security software to identify and neutralize. The Hijack Loader now boasts modules tailored to bypass Windows Defender Antivirus, circumvent User Account Control (UAC), evade inline API hooking, and employ process hollowing, among other techniques.
Originally documented by cybersecurity experts in September 2023, Hijack Loader has since evolved into a conduit for delivering various malware families, including Amadey, Lumma Stealer, Meta Stealer, and Remcos RAT, to name a few. However, what sets this latest version apart is its utilization of a novel technique involving the decryption and parsing of a PNG image to load the next-stage payload. This method, first detailed in connection with a campaign targeting Ukrainian entities, adds another layer of complexity to the malware's operation.
The loader's sophistication doesn't end there. Recent artifacts detected in the wild reveal the incorporation of seven new modules, enabling the creation of new processes, UAC bypass, and the addition of Windows Defender Antivirus exclusion via PowerShell commands. Additionally, the Hijack Loader leverages the Heaven's Gate technique to circumvent user mode hooks, further enhancing its stealth capabilities.
Among the malware families most commonly delivered by Hijack Loader, Amadey stands out, with its second-stage payload loaded via an embedded or downloaded PNG image. As Hijack Loader continues to evolve, integrating new modules and enhancing its capabilities, the challenge of combating its stealthy operations grows ever more daunting.
This development occurs against the backdrop of malware campaigns distributing various loader families like DarkGate and GuLoader, underscoring the persistent threat posed by cybercriminals. Moreover, the emergence of information stealers like TesseractStealer, distributed by ViperSoftX, further highlights the need for heightened vigilance in the face of evolving cyber threats.
In the ongoing battle against cyber adversaries, staying informed and proactive is paramount. By understanding the tactics and techniques employed by malware like Hijack Loader, organizations and individuals alike can better protect themselves against the ever-present threat of cyber attacks.
- Other (42)
- Ransomware (128)
- Events and News (26)
- Features (45)
- Security (433)
- Tips (79)
- Google (22)
- Achievements (9)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (195)
- Cyber Attack (221)
- Data Backup (11)
- Data Breach (80)
- Phishing (139)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (56)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (7)
- vulnerability (54)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (7)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)