A previously undocumented modular loader has emerged as a lucrative tool for cybercriminals in a variety of campaigns. Researchers say the “highly competitive” loader, dubbed Buer, is intended for use by actors seeking a turn-key, off-the-shelf solution. Researchers say they have spotted the loader being actively sold in prominent underground marketplaces since August 2019. Consequently, Buer has made an appearance in several malicious email campaigns and via exploit kits, to then download various strains of malware – from the TrickBot banking trojan to the KPOT information stealer. “The new loader has robust geotargeting, system profiling and anti-analysis features and is currently being marketed on underground forums with value-added setup services,” said researchers with Proofpoint on Wednesday. Buer in the Wild Researchers first came across Buer in the wild in a slew of malicious August email messages, purporting to be replies to earlier legitimate email messages. The emails contained Microsoft Word attachments that used macros to download a next-stage payload. Upon further analysis, researchers found the naming convention for this payload (verinstere222.xls or verinstere33.exe), was frequently associated with the Dreambot variant of Ursnif. However, they were surprised to find that the payload instead droppe Buer, an undocumented loader not previously observed in the wild. “In the following weeks over September and October, Proofpoint researchers and other members of…
http://govanguard.com/wp-content/uploads/2018/04/Header_Logo.png 0 0 govanguard http://govanguard.com/wp-content/uploads/2018/04/Header_Logo.png govanguard2019-12-04 13:32:002019-12-04 13:32:00‘Highly Competitive' Buer Loader Emerges in Underground Markets
Our Standard Office Hours
Monday – Friday: 8:00AM – 5:00PM EDT
Saturday – Sunday: Closed
Where to Find Us
Data Privacy Notice
- – All product names, logos, and brands are property of their respective owners.
- – The use of these names, logos, and brands is for identification purposes only and does not imply endorsement.
- – Content syndication and aggregation of public information is solely for the purpose of identifying information security trends, all syndicated content contains source links to the content creator website. All content is owned by it’s respective content creators.
- – If you are an owner of some content and want it to be removed, please email email@example.com