Premium Only Content
Sophisticated BundleBot Malware Disguised as Google AI Chatbot and Utilities - The Hacker News
🥇 Bonuses, Promotions, and the Best Online Casino Reviews you can trust: https://bit.ly/BigFunCasinoGame
Sophisticated BundleBot Malware Disguised as Google AI Chatbot and Utilities - The Hacker News
î ‚ Jul 21, 2023 î „ THN Cyber Threat / Malware A new malware strain known as BundleBot has been stealthily operating under the radar by taking advantage of .NET single-file deployment techniques, enabling threat actors to capture sensitive information from compromised hosts.
"BundleBot is abusing the dotnet bundle (single-file), self-contained format that results in very low or no static detection at all," Check Point said in a report published this week, adding it is "commonly distributed via Facebook Ads and compromised accounts leading to websites masquerading as regular program utilities, AI tools, and games."
Some of these websites aim to mimic Google Bard, the company's conversational generative artificial intelligence chatbot, enticing victims into downloading a bogus RAR archive ("Google_AI.rar") hosted on legitimate cloud storage services such as Dropbox.
The archive file, when unpacked, contains an executable file ("GoogleAI.exe"), which is the .NET single-file, self-contained application ("GoogleAI.exe") that, in turn, incorporates a DLL file ("GoogleAI.dll"), whose responsibility is to fetch a password-protected ZIP archive from Google Drive.
The extracted content of the ZIP file ("ADSNEW-1.0.0.3.zip") is another .NET single-file, self-contained application ("RiotClientServices.exe") that incorporates the BundleBot payload ("RiotClientServices.dll") and a command-and-control (C2) packet data serializer ("LirarySharing.dll"). "The assembly RiotClientServices.dll is a custom, new stealer/bot that uses the library LirarySharing.dll to process and serialize the packet data that are being sent to C2 as a part of the bot communication," the Israeli cybersecurity company said.
The binary artifacts employ custom-made obfuscation and junk code in a bid to resist analysis, and come with capabilities to siphon data from web browsers, capture screenshots, grab Discord tokens, information from Telegram, and Facebook account details.
Check Point said it also detected a second BundleBot sample that's virtually identical in all aspects barring the use of HTTPS to exfiltrate the information to a remote server in the form of a ZIP archive.
"The delivering method via Facebook Ads and compromised accounts is something that has been abused by threat actors for a while, still combining it with one of the capabilities of the revealed malware (to steal a victim's Facebook account information) could serve as a tricky self-feeding routine," the company noted. The development comes as Malwarebytes uncovered a new campaign that employs sponsored posts and compromised verified accounts that impersonate Facebook Ads Manager to entice users into downloading rogue Google Chrome extensions that are designed to steal Facebook login information.
Users who click on the embedded link are prompted to download a RAR archive file containing an MSI installer file that, for its part, launches a batch script to spawn a new Google Chrome window with the malicious extension loaded using the "--load-extension" flag - start chrome.exe --load-extension="%~dp0/nmmhkkegccagdldgiimedpiccmgmiedagg4" "https://www.facebook.com/business/tools/ads-manager" UPCOMING WEBINAR Shield Against Insider Threats: Master SaaS Security Posture Management Worried about insider threats? We've got you covered! Join this webinar to explore practical strategies and the secrets of proactive security with SaaS Security Posture Management. Join Today "That custom extension is cleverly disguised as Google Translate and is considered 'Unpacked' because it was loaded from the local computer, rather than the Chrome Web Store," Jérôme Segura, director of threat intelligence at Malwarebytes, explained, noting it is "entirely focused on Facebook and grabbing important pieces of information that could allow an attacker to log into accounts."
The captured data is subsequently sent using the Google Analytics API to get around content security policies (CSPs) to mitigate cross-site scripting (XSS) and data injection attacks.
The threat actors behind the activity are suspected to be of Vietnamese origin, who have, in recent months, exhibited acute interest in targeting Facebook business and advertising accounts. Over 800 victims worldwide have been impacted, with 310 of those located in the...
-
LIVE
Total Horse Channel
11 hours ago2025 IRCHA Derby & Horse Show - November 1st
51 watching -
4:19
PistonPop-TV
6 days ago $0.90 earnedThe 4E-FTE: Toyota’s Smallest Turbo Monster
3.08K -
43:07
WanderingWithWine
5 days ago $0.66 earned5 Dreamy Italian Houses You Can Own Now! Homes for Sale in Italy
3.68K2 -
LIVE
Spartan
19 hours agoFirst playthrough of First Berserker Khazan
272 watching -
28:01
Living Your Wellness Life
2 days agoTrain Your Hormones
6.54K -
43:28
The Heidi St. John Podcast
1 day agoFan Mail Friday: Faith Over Fear and Finding Strength in Every Season
3.46K -
1:05:30
SGT Report
1 day agoTHE HORRIBLE TRUTH ABOUT EVERYTHING -- Harley Schlanger
45.2K87 -
11:04
Blackstone Griddles
16 hours agoCountry Fried Steaks on the Blackstone Griddle
90.2K14 -
49:47
Brad Owen Poker
1 day agoI Get My First BIIGGG Win! $25,000+ Buy-in! HORSE Championship! Don’t Miss! Poker Vlog Ep 324
15K1 -
9:53
Rethinking the Dollar
1 day agoWhen Detroit Bleeds, America Suffer! Layoffs Have Begun
19.2K31