Network Security, Malware

AsynRAT, BOINC deployed through SocGholish

Share
computer screen with programming code and a skull, concept of computer security, malware or hacker attack (3d render)

Threat actors have been leveraging the SocGholish downloader malware, also known as FakeUpdates, to facilitate the delivery of the AsyncRAT trojan and a malicious version of the Berkeley Open Infrastructure Network Computing Client, a volunteer computing platform maintained by the University of California, reports Security Affairs.

Installation of AsyncRAT and BOINC occurs at the last part of the multi-stage attack, with the latter facilitating system information exfiltration after establishing a connection with a remote server, an analysis from Huntress revealed. "These malicious installations of BOINC come configured to connect not to one of the legitimate BOINC servers but instead to a look-a-like server such as Rosettahome[.]top. From a malicious server, host data can be collected, files can be transferred, and any number of tasks can be sent down to the hosts and executed. So basically it can operate as a C2," said researchers. Such an issue has already been alerted to BOINC project admins.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.