IT Teams Beware! Weaponized WinSCP & PuTTY Delivers Ransomware

Attackers launched a campaign distributing trojanized installers for WinSCP and PuTTY in early March 2024, as clicking malicious ads after searching for the software leads to downloads containing a renamed pythonw.exe that loads a malicious DLL.  The DLL side-loads a legitimate DLL and injects a Sliver beacon using a reflective DLL injection technique, where the attackers then establish persistence, download additional payloads, attempt to steal data, and deploy ransomware, which shows TTPs similar to those used by BlackCat/ALPHV in the past Appearance of the cloned WinSCP website. The ad for PuTTY download redirected users to a typo-squatted domain (putty.org) hosting a malicious download link.

Source: GBHackers

 


Date:

Categorie(s):