Hackers Using Weaponized Memes to Communicate with Malware

 

World’s Most Secure Crypto Wallet  :The Fort Knox Of Crypto Banking .
DB is the most secure Bitcoin Vault available .
Based on sophisticated biometrical algorithms. No need to remember passwords , not need to type passwords . No Ports . No Backdoors .
No third party involved .No private key stored . No data stored . Lifetime access guaranteed .
What is the safest Bitcoin wallet to use ? Which is the most secure Bitcoin wallet ? What is the best wallet to use for Bitcoin ?
 https://www.digitalbank.capital/
Researchers recently observed that cyber criminals using a weaponized memes in order to communicate with malware for various malicious operations.
Memes are nowadays using for fast communication methods to spreading news which is now abused by cyber criminals to reach victims in a very effective way.
Attackers using Steganography to embed the malicious payload inside of the image to bypass the security solutions to compromise vicitms.
Similarly last year, attackers using 2 memes that was posted in twitter that contain embedded link which point to the command & control server where malware dropped into victims system.
Currently observed campaign being delivered via legitimate service, a popular social media service where attackers posted a meme that looks like very benign.
Malware Infection Process Initially, once users infected by malware which download malicious memes from Twitter account to the victim’s machine
Further analysis reveals that the memes contain a “/print” command hidden inside that will be extracted and helps malware to take a screenshot of the infected victim’s machine.
The later moment it communicates with Command & control server from pastebin and send the collected screenshots of the victim’s machine.
Also, researcher observed that Pastebin URL points to an internal or private IP address, which is possibly a temporary placeholder used by the attackers.
Attackers parse the malicious memes from the twitter account where the file posted using a specific pattern.

Image : TrendMicro According to Trend Micro , There where 2 memes were posted which contains a command that helps malware to perform various malicious operation such as capture screenshots, collect system information, among others.

Following commands used by malware to retrieve the information from the infected machine.
Commands
Description /print Screen capture /processos Retrieve list of running processes /clip Capture clipboard content /username Retrieve username from infected machine /docs Retrieve filenames from a predefined path such as (desktop, %AppData% etc.) Indicators of Compromise
Hashes (SHA-256)
003673cf045faf0141b0bd00eff13542a3a62125937ac27b80c9ffd27bb5c722 3579d609cf4d0c8b469682eb7ff6c65ec634942fa56d47b666db7aa99a2ee3ef 88b06e005ecfab28cfdbcab98381821d7cc82bb140894b7fdc5445a125ce1a8c 8cdb574ba6fcaea32717c36b47fec0309fcd5c6d7b0f9a58fc546b74fc42cacd
Unbreakable Encryption
Your Biometrical Data : Fingertips , Face and Iris Scans , creates your U.D.I ( Unique Digital Identity ) . Our  proprietary algorithm takes your UDI and transform it in your Private Key
You become your own private key .
Private Key is never stored anywhere , at any time . Your Biometric Data , is never stored anywhere , it generates your private key in an 100% secured way , the same second is needed for approving transactions and then is immediately whipped out from any temporary memory .
At any given time, there are no third parties involved  , we never know your private key and  biometrics or store them on servers.
There are no ports , no backdoors , no downloads are allowed .
No need to type passwords , No need to remember passwords .
Lifetime Access Guaranteed .
Security is never compromised .
If the device is seized or stolen, taken apart and forensically analyzed no data can be retrieved.
User Friendly Dashboard  – No possibility to ‘user errors’ that maybe end with loss of crypto