Proofpoint cybersecurity researchers found that TA800, a cybercriminal hacking group that attacks industries in North America, is distributing the NimzaLoader malware, According to ZDNet.
The malware is believed to have been written in Nim, a rarely used programming language, to avoid being analyzed and detected. NimzaLoader enables attackers to control and access Windows computers, allowing them to steal sensitive information or deploy another malware.
“TA800 has often leveraged different and unique malware, and developers may choose to use a rare programming language like Nim to avoid detection, as reverse engineers may not be familiar with Nim's implementation or focus on developing detection for it, and therefore tools and sandboxes may struggle to analyse samples of it,” said Sherrod DeGrippo, senior director of Proofpoint's threat research and detection.
Similar with the trojan malware BazarLoader, NimzaLoader is distributed via phishing emails, which trick potential victims into running a fake PDF downloader that then downloads the malware into their computers.
Jill Aitoro leads editorial for SC Media, and content strategy for parent company CyberRisk Alliance. She 20 years of experience editing and reporting on technology, business and policy.
Attacks with the novel Veaty and Spearal malware strains have been deployed by Iranian state-backed advanced persistent threat operation OilRig, also known as APT34, against Iraqi government agencies and organizations as part of a new cyberespionage campaign.
After achieving initial server access via weak passwords, threat actors proceeded to launch a pair of scripts to retrieve the Hadooken malware, which features not only a cryptocurrency miner but also the Tsunami distributed denial-of-service botnet.