7.1 C
New York
Saturday, March 15, 2025
Home Blog Page 11

OBSCURE#BAT Malware Makes use of Pretend CAPTCHA Pages to Deploy Rootkit r77 and Evade Detection

0


Mar 14, 2025Ravie LakshmananMenace Intelligence / Malware

OBSCURE#BAT Malware Makes use of Pretend CAPTCHA Pages to Deploy Rootkit r77 and Evade Detection

A brand new malware marketing campaign has been noticed leveraging social engineering techniques to ship an open-source rootkit referred to as r77.

The exercise, condemned OBSCURE#BAT by Securonix, allows menace actors to ascertain persistence and evade detection on compromised programs. It is presently not recognized who’s behind the marketing campaign.

The rootkit “has the flexibility to cloak or masks any file, registry key or job starting with a selected prefix,” safety researchers Den Iuzvyk and Tim Peck stated in a report shared with The Hacker Information. “It has been focusing on customers by both masquerading as reputable software program downloads or by way of faux captcha social engineering scams.”

The marketing campaign is designed to primarily goal English-speaking people, significantly the USA, Canada, Germany, and the UK.

Cybersecurity

OBSCURE#BAT will get its title from the truth that the place to begin of the assault is an obfuscated Home windows batch script that, in flip, executes PowerShell instructions to activate a multi-stage course of that culminates within the deployment of the rootkit.

Not less than two completely different preliminary entry routes have been recognized to get customers to execute the malicious batch scripts: One which makes use of the notorious ClickFix technique by directing customers to a faux Cloudflare CAPTCHA verification web page and a second technique that employs promoting the malware as reputable instruments like Tor Browser, VoIP software program, and messaging purchasers.

Whereas it is not clear how customers are lured to the booby-trapped software program, it is suspected to contain tried-and-tested approaches like malvertising or SEO (search engine marketing) poisoning.

Whatever the technique used, the first-stage payload is an archive containing the batch script, which then invokes PowerShell instructions to drop further scripts, make Home windows Registry modifications, and arrange scheduled duties for persistence.

“The malware shops obfuscated scripts within the Home windows Registry and ensures execution by way of scheduled duties, permitting it to run stealthily within the background,” the researchers stated. “Moreover, it modifies system registry keys to register a faux driver (ACPIx86.sys), additional embedding itself into the system.”

OBSCURE#BAT Malware

Deployed over the course of the assault is a .NET payload that employs a bevy of tips to evade detection. This contains control-flow obfuscation, string encryption, and utilizing perform names that blend Arabic, Chinese language, and particular characters.

One other payload loaded via PowerShell is an executable that makes use of Antimalware Scan Interface (AMSI) patching to bypass antivirus detections.

The .NET payload is finally accountable for dropping a system-mode rootkit named “ACPIx86.sys” into the “C:WindowsSystem32Drivers” folder, which is then launched as a service. Additionally delivered is a user-mode rootkit known as r77 for organising persistence on the host and hiding recordsdata, processes, and registry keys matching the sample ($nya-).

The malware additional periodically displays for clipboard exercise and command historical past and saves them into hidden recordsdata for probably exfiltration.

Cybersecurity

“OBSCURE#BAT demonstrates a extremely evasive assault chain, leveraging obfuscation, stealth strategies, and API hooking to persist on compromised programs whereas evading detection,” the researchers stated.

“From the preliminary execution of the obfuscated batch script (set up.bat) to the creation of scheduled duties and registry-stored scripts, the malware ensures persistence even after reboots. By injecting into crucial system processes like winlogon.exe, it manipulates course of conduct to additional complicate detection.”

The findings come as Cofense detailed a Microsoft Copilot spoofing marketing campaign that makes use of phishing emails to take customers to a faux touchdown web page for the unreal intelligence (AI) assistant that is engineered to reap customers’ credentials and two-factor authentication (2FA) codes.

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we publish.



Intel underneath Tan: What enterprise IT consumers have to know



Intel’s discrete GPU ambitions — particularly in enterprise AI — have usually appeared reactive slightly than a part of a transparent strategic imaginative and prescient. The corporate entered the market late, going through Nvidia’s dominant CUDA ecosystem and AMD’s aggressive push into AI GPUs.

“Tan’s background suggests he’s unlikely to double down on discrete GPUs in any respect prices,” Singh mentioned. “He understands that the true AI battle is not only about GPUs, however about AI-first compute architectures. The businesses that reach AI computing are people who embed AI capabilities throughout all their silicon, not simply in a devoted GPU line.”

Intel has already built-in AI acceleration into its CPUs, a method Singh sees as Tan’s doubtless focus. Quite than chasing Nvidia, Intel might embed AI immediately into CPUs and different processors, offering enterprises a scalable AI resolution with out requiring a full GPU redesign.

Nonetheless, discrete GPUs are unlikely to fade totally. “Sure workloads will proceed to demand devoted AI processors, and Intel should pursue this house,” Singh mentioned. “However the distinction underneath Tan will probably be an emphasis on AI computing as a complete, slightly than a myopic race to compete with Nvidia within the GPU market alone.”

Intel’s broader AI investments replicate this diversified method. “Gaudi, for example, isn’t a GPU,” mentioned Paquet. “It’s an AI accelerator, not a general-purpose GPU. Intel should proceed growing processor sorts that provide development alternatives, notably in AI. On the PC aspect, Intel has GPUs and NPUs in its portfolio to help AI workloads.”

What enterprise IT consumers can anticipate

Analysts largely agree that Intel’s server roadmap is about by means of 2025, with no rapid adjustments anticipated underneath Tan. Main realignments on the server and large-die product degree require longer timelines, making short-term shifts unlikely.

Ongoing Cyber Assault Mimic Reserving.com to Unfold Password-Stealing Malware

0


Microsoft Menace Intelligence has recognized an ongoing phishing marketing campaign that started in December 2024, concentrating on organizations within the hospitality trade by impersonating the web journey company Reserving.com.

The marketing campaign, tracked as Storm-1865, employs a complicated social engineering method referred to as ClickFix to ship credential-stealing malware designed to conduct monetary fraud and theft.

A pattern phishing e-mail, purporting to be from a potential visitor.

This assault particularly targets hospitality organizations throughout North America, Oceania, South and Southeast Asia, and varied European areas, specializing in people prone to work instantly with Reserving.com.

As of February 2025, the marketing campaign stays lively and continues to evolve its techniques to bypass standard safety measures.

One other pattern phishing e-mail, purportedly requiring the recipient to handle adverse suggestions a couple of lodge.
One other pattern phishing e-mail, purportedly requiring the recipient to confirm their Reserving.com account.

Misleading Techniques Goal Hospitality Workers By Fraudulent Communications

The Storm-1865 risk actors have developed a methodical method to infiltrating hospitality organizations by first figuring out potential targets inside these companies who’re prone to work together with Reserving.com as a part of their common duties.

The attackers then craft malicious emails that impersonate the journey platform, with message content material various broadly to extend the probabilities of engagement.

These fraudulent communications reference eventualities that might concern hospitality workers, together with adverse visitor opinions, requests from potential visitors, on-line promotion alternatives, and account verification notifications.

Every e-mail incorporates both a malicious hyperlink or a PDF attachment with an embedded hyperlink, purportedly directing recipients to the authentic Reserving.com web site.

When customers click on on these hyperlinks, they’re directed to a convincing faux webpage that shows a counterfeit CAPTCHA overlay in opposition to a background designed to imitate the genuine Reserving.com interface.

This misleading design creates the phantasm that Reserving.com has applied extra verification checks, which can give focused customers a false sense of safety and enhance the chance of compromise.

The assault methodology demonstrates a complicated understanding of the hospitality trade’s operations and successfully exploits the trusted relationship between motels and the favored reserving platform to ship malicious payloads.

ClickFix Social Engineering Method Allows Supply of A number of Malware Households

On the core of this marketing campaign is the ClickFix social engineering method, which represents an evolution within the risk actor’s method to bypassing safety measures.

This system takes benefit of human problem-solving tendencies by displaying faux error messages or prompts that instruct customers to carry out particular actions to resolve supposed points.

On this particular implementation, the faux CAPTCHA overlay instructs customers to make use of a keyboard shortcut to open a Home windows Run window, then paste and execute a command that the phishing web page has surreptitiously added to the person’s clipboard.

A screenshot of the faux Reserving.com webpage, with the faux CAPTCHA overlay outlining the ClickFix course of.

This requirement for direct person interplay helps the assault evade automated safety features that may in any other case detect and block malicious scripts.

The command executed by way of this technique sometimes leverages mshta.exe to obtain and launch malicious code, which varies relying on the particular payload being delivered.

An instance of the mshta.exe command that the focused person launches.

Microsoft has recognized a number of households of commodity malware being distributed by way of this marketing campaign, together with XWorm, Lumma stealer, VenomRAT, AsyncRAT, Danabot, and NetSupport RAT.

Every of those malware variants possesses capabilities designed to steal monetary information and credentials for fraudulent use, which aligns with the historic patterns noticed in Storm-1865 exercise.

The adoption of the ClickFix method represents a major evolution within the risk actor’s techniques, methods, and procedures (TTPs), demonstrating their ongoing efforts to avoid standard safety measures concentrating on phishing and malware distribution.

Diagram illustrating the levels of the an infection course of on this marketing campaign.

Protecting Measures and Organizational Defenses In opposition to Refined Phishing Threats

Organizations can implement a number of methods to guard themselves in opposition to this refined phishing marketing campaign and comparable threats.

Training stays a vital part of protection, with workers coaching targeted on figuring out suspicious emails by checking sender addresses, being cautious of pressing calls to motion, hovering over hyperlinks earlier than clicking, and waiting for typographical errors that always point out phishing makes an attempt.

Technical countermeasures additionally play a significant position in organizational safety in opposition to these threats.

Microsoft recommends deploying phishing-resistant authentication strategies, imposing multi-factor authentication (MFA) on all accounts, configuring Microsoft Defender for Workplace 365 to recheck hyperlinks on click on, and inspiring customers to make the most of net browsers that assist protecting options like Microsoft Defender SmartScreen.

Further technical defenses embody enabling cloud-delivered safety in antivirus merchandise, implementing community safety to forestall entry to malicious domains, enabling automated investigation and remediation capabilities, and activating Zero-hour auto purge (ZAP) in Workplace 365 to quarantine malicious messages.

Indicators of Compromise

Indicator Sort Description
92.255.57[.]155 IP handle C2 server delivering XWorm
147.45.44[.]131 IP handle C2 server delivering Danabot
176.113.115[.]170 IP handle C2 server delivering LummaStealer
31.177.110[.]99 IP handle C2 server delivering Danabot
185.7.214[.]54 IP handle C2 server delivering XWorm
176.113.115[.]225 IP handle C2 server delivering LummaStealer
87.121.221[.]124 IP handle C2 server delivering Danabot
185.149.146[.]164 IP handle C2 server delivering AsyncRAT
01ec22c3394eb1661255d2cc646db70a66934c979c2c2d03df10127595dc76a6   File hash (SHA-256) Danabot malware
f87600e4df299d51337d0751bcf9f07966282be0a43bfa3fd237bf50471a981e File hash (SHA-256) Danabot malware
0c96efbde64693bde72f18e1f87d2e2572a334e222584a1948df82e7dcfe241d   File hash (SHA-256) Danabot malware

Are you from SOC/DFIR Groups? – Analyse Malware Incidents & get dwell Entry with ANY.RUN -> Begin Now for Free. 

ios – .NET MAUI – Get machine mannequin quantity


I’m in search of a method to get the machine quantity (particularly for iPhone) in .NET MAUI like this:

iPhone4            => 4,
iPhone4S           => 4,
iPhone5            => 5,
iPhone5S           => 5,
iPhone5C           => 5,
iPhone6            => 6,
iPhone6Plus        => 6,
iPhone6S           => 6,
iPhone6SPlus       => 6,
iPhoneSE           => 6,
iPhone7            => 7,
iPhone7Plus        => 7,
iPhone8            => 8,
iPhone8Plus        => 8,
iPhoneX            => 10,
iPhoneXS           => 10,
iPhoneXSMax        => 10,
iPhoneXR           => 10,
iPhone11           => 11,
iPhone11Pro        => 11,
iPhone11ProMax     => 11,
iPhoneSE2          => 11,
iPhone12Mini       => 12,
iPhone12           => 12,
iPhone12Pro        => 12,
iPhone12ProMax     => 12,
iPhone13Mini       => 13,
iPhone13           => 13,
iPhone13Pro        => 13,
iPhone13ProMax     => 13,
iPhoneSE3          => 13,
iPhone14           => 14,
iPhone14Plus       => 14,
iPhone14Pro        => 14,
iPhone14ProMax     => 14,
iPhone15           => 15,
iPhone15Plus       => 15,
iPhone15Pro        => 15,
iPhone15ProMax     => 15,
iPhone16           => 16,
iPhone16Plus       => 16,
iPhone16Pro        => 16,
iPhone16ProMax     => 16,
iPhone16e          => 16,

I do know there have to be a method to get the identifiers like iPhone11,2 (iPhone XS) or iPhone17,3 (iPhone 16) like on this publish: The way to decide the present iPhone/machine mannequin?

However I cant determine how one can get them.

All I acquired is to make use of Microsoft.Maui.Gadgets.DeviceInfo

Utilizing DeviceInfo.Mannequin solely returns “iPhone” with none information concerning the mannequin quantity.

I wrote a prototype technique that reads the quantity by way of regex from the string returned by DeviceInfo.Title which returns one thing like “iPhone 16” by way of regex

public static bool IsIphoneModelNoHigherThan(int modelNo) 
{
    string deviceName = DeviceInfo.Present.Title;

    Match match = Regex.Match(deviceName, @"iPhones*(d+)");

    if (match.Success && int.TryParse(match.Teams[1].Worth, out int modelNumber))
    {
        return modelNumber > modelNo;
    }
    
    return false;
}

This in fact doesn’t work with fashions like iPhone SE/X/XR so I’m in search of a safer method to do it however DeviceInfo doesn’t appears to ship a lot details about the mannequin quantity.

Nationwide Robotics Programme launches RoboNexus to assist Singapore startups

0


Nationwide Robotics Programme launches RoboNexus to assist Singapore startups

Spinoff Robotics, which gives tethered drones for cleansing, is a participant in RoboNexus. Supply: Spinoff Robotics

Singapore is likely one of the prime international locations on this planet by way of robotics density, thanks partially to authorities promotion. The Nationwide Robotics Programme at present launched RoboNexus, an accelerator program designed to fast-track promising robotics startups and small and midsize enterprises, or SMEs, from Singapore onto the worldwide stage.

The Nationwide Robotics Programme (NRP) unveiled this system at RoboSG! 2025, Singapore’s largest robotics showcase. RoboNexus is meant to supply native startups with tailor-made mentorships, business-development assist, and world market entry.

“We’ve a rising and modern robotics start-up neighborhood that wishes to make a larger influence globally. We’ll improve our ecosystem for robotics start-ups in Singapore to collaborate, scale and seize world market alternatives.” acknowledged Tung Meng Fai, govt director (designate) of the NRP. “RoboNexus brings collectively public and private-sector companions to speed up robotics innovation into influence — strengthening our industries, empowering folks, and addressing world challenges.”

After South Korea, Singapore has the world’s second-highest robotic density, with 770 robots per 10,000 staff in 2023, in line with the Worldwide Federation of Robotics (IFR). The group famous that the nation, which positioned above China, Germany, and Japan, has a comparatively low variety of workers within the manufacturing business. By comparability, the U.S. had a robotic density of 295 items in 2023 and was ranked eleventh.


SITE AD for the 2025 Robotics Summit registration.
Register now so you do not miss out!


NRP focuses on startups in Singapore

The Nationwide Robotics Programme is a multi-agency nationwide program hosted by the Company for Science, Know-how and Analysis (A*STAR). The company oversees the analysis, improvement, and translation of robotics enablers and techniques in Singapore.

Established in 2016 as a part of the Analysis, Innovation and Enterprise (RIE) initiative, the NRP mentioned it goals to catalyze differentiated robotics capabilities by funding user-driven analysis and improvement. This system additionally makes use of the initiatives it funds to develop Singapore’s robotics expertise pool and nurture the native ecosystem.

Singapore introduced in April 2024 that it was investing $60 million within the NRP.

Since its pilot in September 2024, six firms have begun benefitting from RoboNexus.

  • LionsBot: This startup, based in 2018, has developed autonomous cleansing robots for industrial areas.
  • KABAM Robotics: The Co-Lab and Halo robots use Sensible+ to intelligently clear and safe services, in line with this firm, based in 2020.
  • dConstruct Robotics: Based in 2021, dConstruct makes use of simultaneous localization and mapping (SLAM) navigation and 3D digital twins to assist industries comparable to development, protection, and logistics.
  • Spinoff Robotics: Additionally based in 2021, Spinoff develops tethered drones for high-altitude industrial cleansing and inspections.
  • XSQUARE Applied sciences: This firm, based in 2019, affords autonomous forklifts and the Xymphony orchestration software program to assist warehouse operators handle labor shortages and rising operational calls for.
  • Globotix: This 2016-founded startup affords modular, multi-functional robots comparable to FLEXA for services administration.

LionsBot and KABAM Robotics tapped into analysis and expertise pipelines to speed up product improvement, whereas the opposite 4 firms have refined and deployed their applied sciences by means of end-user collaborations and expanded business partnerships.

In November 2024, three firms joined an NRP-led business and analysis journey to the U.S., assembly prime robotics firms, researchers, and buyers to discover enterprise alternatives, study from world finest practices, and strengthen their plans for worldwide progress.

“RoboNexus has performed a pivotal function in driving dConstruct Robotics’ growth, offering helpful world market insights, fostering strategic partnerships, and opening doorways to essential networks inside the Singapore authorities and internationally,” mentioned Chinn Lim, co-founder and CEO of dConstruct Robotics. “These collaborations have strengthened dConstruct Robotics’ market presence and sharpened its strategic focus, positioning the corporate for continued progress within the AI and robotics sector.’

With the official launch, RoboNexus is open for registrations from Singapore-based robotics firms and people seeking to set up operations in Singapore.

XSQARE Robotics is a Singapore company offering autonomous forklifts like the one shown here.

XSQARE mentioned its autonomous forklifts and software program assist optimize supplies dealing with. Supply: XSQARE Robotics

RoboSG! 2025 exhibits off Singapore’s improvements

NRP claimed that RoboSG! 2025 is Singapore’s largest robotics showcase, that includes greater than 75 robots throughout 65 cubicles spanning eight thematic zones. The 2-day occasion greater than doubled the dimensions of NRP’s first large-scale public occasion, NRP 6, in 2023.

Day 1 targeted on business engagement, whereas Day 2 opened to the general public to boost consciousness and encourage the following technology of robotics expertise. Attendees skilled stay demonstrations of robots for safety, facility administration, final mile-delivery, assistive healthcare and wellness.

JTC Corp.’s Punggol Digital District (PDD) hosted the occasion. PDD’s digital spine, the Open Digital Platform (ODP), affords a testbed for integrating robotics inside city infrastructure by means of real-time information, predictive upkeep, and digital twin know-how.

Dr. Tan See Leng, minister for manpower and second minister for commerce and business, officiated the RoboNexus launch. He was joined by Dr. Janil Puthucheary, minister in control of GovTech, and Alvin Tan, minister of state for tradition, neighborhood, and youth, in addition to commerce and business. Esben Østergaard, co-founder of Common Robots and co-founder and CEO of REInvest Robotics, sits on the RoboNexus Advisory Board.

Dr. Puthucheary, who can also be senior minister of state for digital improvement and knowledge and well being, witnessed the signing of 1 analysis collaboration settlement (RCA) and two memorandums of understanding (MoUs). The agreements plan to deliver collectively authorities companies, analysis establishments, and business leaders to advance robotics analysis, business collaboration, and industrial adoption.

“Our robotics ecosystem is rising steadily,” mentioned Prof Quek Tong Boon, chief govt of NRP, in his welcoming remarks. “When NRP first began eight years in the past, I couldn’t identify greater than 10 robotics provide firms in Singapore.”

“Two years in the past, I shared that NRP had by then mapped 205,” he added. “As of final week, we now have 302 firms in our database.”

The NRP’s earlier initiatives embrace RoboCluster, an enabler for sectors comparable to superior manufacturing, aviation, maritime, and services administration.

“RoboCluster facilitates shut collaboration amongst analysis establishments, robotics firms, authorities companies, and business finish customers, making certain robotics improvements handle business wants by means of scalable, impactful options,” mentioned the group.