Crypto Malware Spreads via SourceForge Posing as Cracked Software

Article Highlights
Off On

Malicious actors have taken advantage of SourceForge, a reputable software hosting platform, to propagate cryptocurrency miner and clipper malware, masquerading as cracked versions of popular applications. This deceptive tactic lures users into downloading harmful software under the guise of legitimate programs such as Microsoft Office, exposing them to significant cybersecurity threats.

Malicious Projects Masquerading as Legitimate Software

Kaspersky, a well-regarded cybersecurity firm, recently revealed that hackers are leveraging SourceForge to disseminate malware by creating fraudulent projects that impersonate legitimate software. One glaring example of this is a project titled “officepackage.” This project ostensibly offers various Microsoft Office add-ins, purportedly sourced from a legitimate GitHub repository. It appears authentic both in its description and content, as it mimics genuine details to deceive users. The strategy behind these fake projects is simple yet effective: attackers replicate the appearance of legitimate applications to create a false sense of security. Users believe they are downloading useful add-ins for their Microsoft Office suite, but in reality, they are stepping into a malware trap. The project “officepackage,” for instance, utilizes components and descriptions directly taken from GitHub, enhancing its illusion of legitimacy. This fraudulent setup on SourceForge, including the domain “officepackage.sourceforge[.]io,” lists numerous Microsoft Office applications and download links primarily in the Russian language, appealing specifically to Russian-speaking users.

Deceptive Download Links and Redirects

The deceptive practices by attackers don’t stop at just mimicking legitimate software projects. When users attempt to download applications from projects like “officepackage,” they encounter a website interface designed to appear convincing. Hovering over the download buttons reveals innocuous-looking URLs such as “loading.sourceforge[.]io/download.” This superficial authenticity builds a false sense of trust among users, making them believe the link will direct them to the intended software.

However, clicking the download button reroutes users to an unrelated webpage hosted on “taplink[.]cc.” Here, users face another download button, leading to the download of a 7 MB ZIP archive named “vinstaller.zip.” Upon opening this archive, users find another password-protected ZIP file (“installer.zip”) and a text file containing the necessary password. Within the protected ZIP file lies an MSI installer crafted to deploy malicious components. This installer includes a console archive utility known as “UnRAR.exe,” a RAR archive, and a VB script.

The VB script runs a PowerShell interpreter, which executes a batch file named “confvk” fetched from GitHub. This file harbors the password for the RAR archive and facilitates the execution of more malicious scripts. The batch file initiates two critical PowerShell scripts: one that transmits system metadata through the Telegram API, and another that downloads an additional script to act on the RAR archive contents. This intricate process ultimately leads to the deployment of malware payloads, specifically ClipBanker—a cryptocurrency miner and clipper malware.

Broader Implications and Additional Campaigns

The deployment of cryptocurrency malware via SourceForge is not an isolated incident. Kaspersky’s report highlights broader implications, suggesting that the malware scheme may enable attackers to gain system access, potentially selling it to more dangerous entities. This aspect underscores the significant threat posed to users who download software from unofficial sources.

Further complicating the picture, another campaign involves distributing a malware downloader known as TookPS. This downloader spreads via fraudulent sites imitating legitimate software platforms. For instance, sites like “deepseek-ai-soft[.]com” mimic the DeepSeek AI chatbot and various remote desktop and 3D modeling tools. These fake websites appear authentic and often rank high in sponsored Google search results, ensnaring unsuspecting users. TookPS’s primary function is to download and run PowerShell scripts that allow remote access to infected systems via SSH. The downloader also deploys a modified trojan called TeviRat, which gives attackers unrestrained access to victims’ computers.

Additionally, Kaspersky’s findings indicate the use of DLL sideloading techniques to alter TeamViewer remote access software on infected machines. By placing a malicious library alongside TeamViewer, hackers can modify its behavior stealthily, enabling covert remote access without the user’s awareness.

Evolving Threat Landscape

Malicious actors have exploited SourceForge, a respected software-hosting platform, to spread cryptocurrency miner and clipper malware. They disguise these harmful programs as cracked versions of popular applications, deceiving users into downloading what they think are legitimate software packages such as Microsoft Office. This treacherous tactic not only undermines the trust in well-known applications but also puts users at serious risk of cybersecurity threats. Instead of getting the desired software, users end up with malware that can drain their computer’s resources by mining cryptocurrencies or intercept and alter clipboard contents to steal sensitive information, such as cryptocurrency wallet addresses or other personal data. This kind of malicious attack highlights the importance of downloading software only from trusted sources and being wary of cracked versions, which often come with hidden dangers. SourceForge’s reputation as a reliable platform is being manipulated by these bad actors, stressing a need for greater vigilance and stronger security measures to protect users from such deceptive practices.

Explore more

How is Telenor Transforming Data for an AI-Driven Future?

In today’s rapidly evolving technological landscape, companies are compelled to adapt novel strategies to remain competitive and innovative. A prime example of this is Telenor’s commitment to revolutionizing its data architecture to power AI-driven business operations. This transformation is fueled by the company’s AI First initiative, which underscores AI as an integral component of its operational framework. As Telenor endeavors

How Are AI-Powered Lakehouses Transforming Data Architecture?

In an era where artificial intelligence is increasingly pivotal for business innovation, enterprises are actively seeking advanced data architectures to support AI applications effectively. Traditional rigid and siloed data systems pose significant challenges that hinder breakthroughs in large language models and AI frameworks. As a consequence, organizations are witnessing a transformative shift towards AI-powered lakehouse architectures that promise to unify

6G Networks to Transform Connectivity With Intelligent Sensing

As the fifth generation of wireless networks continues to serve as the backbone for global communication, the leap to sixth-generation (6G) technology is already on the horizon, promising profound transformations. However, 6G is not merely the progression to faster speeds or greater bandwidth; it represents a paradigm shift to connectivity enriched by intelligent sensing. Imagine networks that do not just

AI-Driven 5G Networks: Boosting Efficiency with Sionna Kit

The continuing evolution of wireless communication has ushered in an era where optimizing network efficiency is paramount for handling increasing complexities and user demands. AI-RAN (artificial intelligence radio access networks) has emerged as a transformative force in this landscape, offering promising avenues for enhancing the performance and capabilities of 5G networks. The integration of AI-driven algorithms in real-time presents ample

How Are Private 5G Networks Transforming Emergency Services?

The integration of private 5G networks into the framework of emergency services represents a pivotal evolution in the realm of critical communications, enhancing the ability of first responders to execute their duties with unprecedented efficacy. In a landscape shaped by post-9/11 security imperatives, the necessity for rapid, reliable, and secure communication channels is paramount for law enforcement, firefighting, and emergency