Home > Cyber News > New Jupyter Infostealer Malware Targets Chrome and Firefox Browser Data
CYBER NEWS

New Jupyter Infostealer Malware Targets Chrome and Firefox Browser Data

jupyter infostealer malwareSecurity researchers spotted a new piece of infostealing malware called Jupyter. The malware is a .NET infostealer that primarily targets Chromium, Firefox, and Chrome browser data, say Morphisec researchers.

Jupyter Infostealer

According to the research, the malware demonstrates many capabilities that enable a full backdoor functionality. These capabilities include a command-and-control client, the download and execution of malware and PowerShell scrips, as well as shellcode inserted into legitimate Windows configuration apps.

How does the Jupyter attack start?

Jupyter’s attack chain typically starts with a downloaded zip file that contains an installer, an executable that usually impersonates legitimate software such as Docx2Rtf. Some of these installers have maintained 0 detections in VirusTotal over the last 6 months, making it exceptional at bypassing most endpoint security scanning controls, Morphisec says.




Once the installer is executed, the Jupyter loader in the form of a .NET client is injected into the memory. The client is characterized by a well-built communication protocol, versioning matrix, and persistence modules.

The next stage includes the execution of a PowerShell command, which activates the .NET module. Both .NET components present similar code structures, code obfuscation, and unique UID implementation. All of these elements point to an end-to-end framework designed to implement the infostealer into compromised systems.

When did the first Jupyter attacks take place?

The researchers have been observing a steady flow of forensic data pointing to Jupyter since May this year. “While many of the C2s are no longer active, they consistently mapped to Russia when we were able to identify them,” Morphisec adds.

There is more evidence revealing that the attacks are Russian, such as the misspelling of the planet Jupiter’s name. “Additionally, Morphisec researchers ran a reverse Google Image search of the C2 admin panel image and were not surprised to find the exact image on Russian-language forums,” the researchers conclude.

Another example of a notable Trojan with information-stealing capabilities is the Astaroth malware.

Milena Dimitrova

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:
Twitter

Leave a Comment

Your email address will not be published. Required fields are marked *

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...