Technology 3 min read

New Adwind Virus can Evade Most Antivirus Software

A new form of Trojan has been released into the internet that now has the power to circumvent most antivirus software. | Image By Golden Sikorka | Shutterstock

A new form of Trojan has been released into the internet that now has the power to circumvent most antivirus software. | Image By Golden Sikorka | Shutterstock

Security analysts are warning the public about the latest Adwind RAT campaign which gives the malware the ability to avoid most antivirus software.

According to an investigation by cybersecurity researchers from the intelligence firms Cisco Talos and ReversingLabs, the Adwind RAT virus is now back with a more sophisticated toolkit that can reportedly fool antivirus programs. With this new skill, the Trojan malware can quickly and effortlessly exploit most domestic and commercial systems.

Adwind is a famous Remote Access Trojan that was previously used by cybercriminals to launch attacks against organizations and industries worldwide. The trojan, which is also known as JSocket, Frutas, Sockrat, jRAT, and AlienSpy, is packed with different skills that can be used to penetrate computer networks and systems.

Adwind’s multifunctional capabilities allow it to monitor a computer user’s activities. It can log keystrokes, take screenshots, exfiltrate vital information like user credentials, use the webcam, record videos and audio, and host other malicious activities.

Back in February of this year, Comodo Group’s Threat Research Lab discovered how a group of hackers used emails disguised as Swift messages to spread Adwind RAT. Comodo believed that the campaign was designed to spy on users and collect valuable data from targeted enterprise networks and endpoints in preparation for a secondary attack.

The latest variants of the trojan are equipped with capabilities to include the cryptocurrency field. Talos researchers reported that the new Adwind RAT will now also attempt to steal the cryptographic keys needed to access the cryptocurrency wallets on the affected computers.

A targeted campaign was reportedly launched last August to spread Adwind 3.0, the most recent variant of RAT. The campaign targeted Windows, Linux, and Mac systems from Turkey and Germany. The attack includes a Dynamic Data Exchange (DDE) code injection which compromises Microsoft Excel and can trick signature-based antivirus programs.

The campaign involves sending emails with a .CSV or .XLT file attachment which can be opened in Excel by default. The files contain two droppers which both have DDE code injection. Instead of reading the file as a dropper, the signature-based antivirus reads it as corrupted which allows a user to open it.

Though Excel could detect the file as fake and should issue three warnings, persisting to open the file would execute the dropper and DDE injection script. The code can then create a Visual Basic script which utilizes the command-line tool bitasdmin. This is used in Excel to download, upload, and monitor jobs. The hackers will then exploit the bitasdmin tool to download and release the full Adwind RAT.

With this new threat to online security, people are advised to be vigilant when it comes to opening emails. Do not open emails or files from unknown sources and immediately delete them if possible.

How do you keep your computer safe from cyber attacks and malware?

First AI Web Content Optimization Platform Just for Writers

Found this article interesting?

Let Chelle Fuertes know how much you appreciate this article by clicking the heart icon and by sharing this article on social media.

Profile Image

Chelle Fuertes

Chelle is the Product Management Lead at INK. She's an experienced SEO professional as well as UX researcher and designer. She enjoys traveling and spending time anywhere near the sea with her family and friends.

Comments (0)
Most Recent most recent
share Scroll to top

Link Copied Successfully

Sign in

Sign in to access your personalized homepage, follow authors and topics you love, and clap for stories that matter to you.

Sign in with Google Sign in with Facebook

By using our site you agree to our privacy policy.