Create an account

Very important

  • To access the important data of the forums, you must be active in each forum and especially in the leaks and database leaks section, send data and after sending the data and activity, data and important content will be opened and visible for you.
  • You will only see chat messages from people who are at or below your level.
  • More than 500,000 database leaks and millions of account leaks are waiting for you, so access and view with more activity.
  • Many important data are inactive and inaccessible for you, so open them with activity. (This will be done automatically)


Thread Rating:
  • 635 Vote(s) - 3.56 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Purple Fox can Now Spread Like a Worm!

#1
Purple Fox, a Windows-based exploit kit, has now been upgraded with a worm module that infects all the Windows systems reachable over the internet. The malware has rootkit and backdoor capabilities and is used as a downloader to spread other malware strains. It was first spotted in 2018 when it infected 30,000 devices.

According to security researchers from Guardicore Labs, Purple Fox-based attacks have increased significantly since May 2020, and reached a total of 90,000 attacks by March 2021, showing a whopping 600% increase in infections.

The malware scans the internet for any vulnerable Windows machines and after identifying an exposed Windows system, the worm module uses SMB password brute-force to infect it.
In addition, Purple Fox uses phishing campaigns and web browser vulnerabilities to deploy its payloads. So far, it has deployed its malware droppers and other modules on a network of bots.
Devices added in its network of bots include Windows machines running Windows IIS version 7.5, Microsoft FTP, Microsoft RPC, Microsoft Server SQL Server 2008 R2, Microsoft HTTPAPI/2.0, and Microsoft Terminal Service.

Just before restarting the infected devices, the exploit installs a rootkit module using an open-source rootkit named as hidden. This hidden rootkit can hide dropped files, folders, or registry entries created on infected Windows systems.
After deploying the rootkit, the malware renames its DLL payload to match a Windows system DLL and configure it to launch at system startup.
Once the malware is executed on system launch, each infected system exhibits the same worm-like behavior.
It sends an SMB probe to other accessible machines and tries to brute-force the responding machines to gain access.
Reply

#2
It seems like a sophisticated form of malware.

You can read more In

[To see links please register here]

.
Reply

#3
(03-27-2021, 07:28 AM)bessigoceuu Wrote:

[To see links please register here]

SMB password brute-force to infect it.

Is using the EternalBlue variation using bruteforce. You know that it only takes a change from 1 to 0 in the registry to disable SMB.
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

©0Day  2016 - 2023 | All Rights Reserved.  Made with    for the community. Connected through