Multipurpose Glupteba Malware Controls OS Boot Process to Hide Itself

by Esmeralda McKenzie
Multipurpose Glupteba Malware Controls OS Boot Process to Hide Itself

Multipurpose Glupteba Malware Controls OS Boot Process to Hide Itself

Multipurpose Glupteba Malware Controls OS Boot Route of to Camouflage Itself

Glupteba, a decade-long-established malware in monetary cybercrime, unveiled a unusual advertising and marketing campaign in November 2023.

No topic its prolonged tenure, the undiscovered parts encompass a UEFI bootkit that enables stealthy persistence, though-provoking detection, and elimination.

Security analysts at Palo Alto Networks currently found Glupteba, which is a multipurpose malware that controls the OS boot process to veil itself.

Multipurpose Glupteba Malware

From a general backdoor, Glupteba stepped forward correct into a highly efficient botnet that has became a predominant energy in cyber threats on yarn of the early 2010s.

This malware is basically known for intricate an infection chains as it reflects operators’ constant enhancements to elude venerable safety measures.

Glupteba an infection chain (Source - Palo Alto Networks)
Glupteba an infection chain (Source – Palo Alto Networks)

Cortex Agent 8.3 introduces UEFI Protection for boot kits appreciate Glupteba by offering detection and prevention.

Glupteba’s modular manufacture facilitates additional payloads, making it versatile in varied assault settings. At the same time, fresh campaigns possess ancient pay-per-set up products and providers, which enable unusual global infections.

The PPI ecosystem evolving from ad distribution, as it fuels malware appreciate Glupteba, RedLine Stealer, and ransomware. Key gamers appreciate Ruzki, bustle by les0k on Russian boards, enable unusual malware dissemination.

Overview of les0k, 'king of installs,' (Source - Palo Alto Networks)
Overview of les0k, ‘king of installs,’ (Source – Palo Alto Networks)

The PPI products and providers trap malware operators with promotions and reductions, pricing in step with installations and regions.

Glupteba revived globally in December 2022 after Google’s 2021 disruption, impacting varied countries and industries.

Its resurgence entails internet-based completely distribution and phishing attacks that cause unusual infections.

Icons for malicious installer files (Source - Palo Alto Networks)
Icons for malicious installer files (Source – Palo Alto Networks)

The multi-stage advertising and marketing campaign initiates by luring users to download spurious set up files. Glupteba spreads via loaders appreciate PrivateLoader or SmokeLoader.

In 2023, a pair of chains confirmed PrivateLoader leading to SmokeLoader and eventually Glupteba. This highlights the malware’s versatility, and never handiest that, even the diagnosis unveiled undocumented UEFI bootkit.

Malware an infection (Source - Palo Alto Networks)
Malware an infection (Source – Palo Alto Networks)

UEFI defines computer firmware by handling boot and OS interaction. Pre-boot, firmware hundreds from SPI flash. The ESP in the boot instrument with Windows Boot Supervisor hundreds in the midst of Windows boot.

Malware in ESP disrupts safety, and the SPI implant supplies more energy nonetheless needs elevated privileges. On the replacement hand, few UEFI boot kits had been reported, appreciate LoJax and BlackLotus (2023).

UEFI boot process (Source - Palo Alto Networks)
UEFI boot process (Source – Palo Alto Networks)

EfiGuard, an originate-offer UEFI bootkit that patches Windows kernel via EfiGuardDxe.efi by disabling PatchGuard and DSE. EfiGuardDxe.efi runs by inserting in in UEFI driver entry or the utilization of a personalised loader (Loader.efi), as Glupteba does.

The driver hooks EFI Boot Provider LoadImage feature by intercepting the Windows Boot Supervisor loading (bootmgfw.efi) which initiates a sequence of patches to patch the kernel (ntoskrnl.exe).

Glupteba malware showcases contemporary cyber threats with its modern UEFI bypass, which challenges detection.

The PPI ecosystem unearths the collaboration between cybercriminals that stresses the need for enhanced cybersecurity strategies previous the same old defenses.

Source credit : cybersecuritynews.com

Related Posts