Proofpoint cybersecurity researchers found that TA800, a cybercriminal hacking group that attacks industries in North America, is distributing the NimzaLoader malware, According to ZDNet.
The malware is believed to have been written in Nim, a rarely used programming language, to avoid being analyzed and detected. NimzaLoader enables attackers to control and access Windows computers, allowing them to steal sensitive information or deploy another malware.
“TA800 has often leveraged different and unique malware, and developers may choose to use a rare programming language like Nim to avoid detection, as reverse engineers may not be familiar with Nim's implementation or focus on developing detection for it, and therefore tools and sandboxes may struggle to analyse samples of it,” said Sherrod DeGrippo, senior director of Proofpoint's threat research and detection.
Similar with the trojan malware BazarLoader, NimzaLoader is distributed via phishing emails, which trick potential victims into running a fake PDF downloader that then downloads the malware into their computers.
Jill Aitoro is senior vice president of content strategy for CyberRisk Alliance. She has more than 20 years of experience editing and reporting on technology, business and policy. Prior to joining CRA, she worked at Sightline Media as editor of Defense News and executive editor of the Business-to-Government Group. She previously worked at Washington Business Journal and Nextgov, covering federal technology, contracting and policy, as well as CMP Media’s VARBusiness and CRN and Penton Media’s iSeries News.