The Cobalt Gang cybercrime group has launched a new round of phishing campaigns targeting primarily Russian and Romanian banking customers with CobInt, a recently discovered malicious backdoor and downloader.

Written in C, CobInt is comprised of three stages: a first-stage downloader, the primary payload, and a series of modules capable of reconnaissance activities such as capturing screenshots and compiling a list of running process names.

The main payload is what actually communicates with the attackers' command-and-control server and downloads the additional modules via HTTPS, Proofpoint reported in a Sept. 11 blog post. The C&C server response is intentionally designed to look like an HTML file as a technique for avoiding analysis tools.

Please register to continue.

Already registered? Log in.

Once you register, you'll receive:

  • News analysis

    The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.

  • Archives

    Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.

  • Daily Newswire

    SC Media’s essential morning briefing for cybersecurity professionals.

  • Learning Express

    One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.