Security researchers from Intezer uncovered a large scale operation targeting cryptocurrency users with a previously undetected RAT named ElectroRAT.
The campaign was uncovered in December, but according to the experts is active since at least January 2020.
The campaign appears well arranged, operators carried out a full-fledged marketing campaign, employed a custom cryptocurrency-related applications and the multiplatform RAT dubbed ElectroRAT.
“The campaign includes: Domain registrations, websites, trojanized applications, fake social media accounts and a new undetected RAT that we have named ElectroRAT. ElectroRAT is written in Golang and compiled to target multiple operating systems: Windows, Linux and MacOS.” reads the analysis published by Intezer.
“It is rather common to see various information stealers trying to collect private keys to access victims’ wallets. However, it is rare to see tools written from scratch and used to target multiple operating systems for these purposes.”
ElectroRAT is written in Golang, the analysis of the number of unique visitors to the Pastebin pages used to locate the C2 servers revealed it has already infected thousands of victims.
The attackers developed three different malicious applications as part of this campaign, the cryptocurrency trade management applications “Jamm” and “eTrade” and the cryptocurrency poker app “DaoPoker”.
Each application has a Windows, Linux and Mac version and its binaries are hosted on websites specifically set up for this campaign.
The attackers also created Twitter and Telegram profiles for the “DaoPoker” app and involved a paid social media influencer to advertise the app.
Once a victim runs the application, an innocent GUI will open, while ElectroRat runs hidden in the background as “mdworker”.
Upon launching the apps on a victim’s computer, they would show a foreground user interface designed to divert the victims’ attention from the malicious ElectroRAT background process.
The malicious application and the ElectroRAT binaries have a low detection rate in VirusTotal.
“ElectroRAT is extremely intrusive. It has various capabilities such as keylogging, taking screenshots, uploading files from disk, downloading files and executing commands on the victim’s console. The malware has similar capabilities for its Windows, Linux and MacOS variants.” continues the variant.
The malware is able to steal all funds from the victim’s wallet.
Users that have executed the Jamm, eTrade, or DaoPoker apps on their computer, should kill the related processes and remove all associated files.
“It is very uncommon to see a RAT written from scratch and used to steal personal information from cryptocurrency users. It is even more rare to see such a wide-ranging and targeted campaign that includes various components such as fake apps/websites and marketing/promotional efforts via relevant forums and social media.”
“ElectroRAT is the latest example of attackers using Golang to develop multi-platform malware.” Intezer concludes.
If you want to receive the weekly Security Affairs Newsletter for free subscribe here.
(SecurityAffairs – hacking, ElectroRAT)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.