Breaking

Blister malware can breach your devices in absolute stealth

A new malicious campaign was discovered by security researchers that disguises malicious code as legitimate exe files. The researchers have figured out that there is a payload that is considered a novel threat and being distributed to Windows systems with a low detection rate called Blister.

The actors behind Blister malware have made their move sneaky by employing multiple techniques, the code-signing certificates are one among many techniques.

A brief study on Blister malware and its capabilities

The actors behind Blister malware is found to be actively running this campaign for more than three months now, as per Elastic search company. The actors have used a code-signing certificate which is from Aug 23 and was issued by Sectigo for a company called Blist LLC.

Though usage of valid certificates to sign malware is a traditional trick as they were used to steal certificates from legitimate companies but now the attack vectors have improved as the actors get a valid certificate from a organization directly.

Elastic claims that they have reported this case with Sectigo, as the Blister malware disguises into a legitimate library along with other techniques to stay undetected.

Then elevated privileges are also added to the Blister malware using the rundll32 command, with valid certificate and administrator privileges will help Blister malware evade security solutions and sneak into the devices.

Source: Elastic

Protecting your network against Blister malware

After the sneaky penetration, Blister malware decodes from the bootstrapping code. The code is dormant for ten minutes to escape sandbox analysis.

Blister malware then starts decrypting embedded payloads which will allow lateral movement and remote access. The malware achieves persistence which will allow it to launch during startup by copying itself into the ProgramData folder as disguising itself as rundll32.exe.

Both signed and unsigned versions of Blister malware can have a reduced detection rate against antivirus software. With the combination of valid-code signing certs, disguised legitimate looking libraries with malicious codes, and payloads allowed the success rates of the attack.

Elastic company has published a Yara rule to detect Blister malware presence and provide the details of the malware to assist organizations prepare against it.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

1 day ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago