This ‘undetectable’ malware kit packs a whole load of threats into a single package

Security attack
(Image credit: Shutterstock / ozrimoz)

Cybersecurity researchers have identified a dangerous new malware subscription service capable of facilitating a wide variety of attacks.

Branded the “Eternity Project”, the modular malware kit contains functionality that enables buyers to steal passwords and credit card information, launch ransomware attacks, infect victims with cryptomining malware and more.

In future, the malware authors also intend to deliver new features, including a utility that helps users launch targeted DDoS attacks.

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022end of this survey

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/£10.99.

Dangerous malware

The Eternity Project kit is being marketed in a Telegram channel with roughly 500 members, which is used by the developers to announce new features and instruct buyers on how to deploy the malware most effectively.

After selecting their desired feature set and paying the corresponding fee in cryptocurrency, buyers can reportedly utilize the Telegram Bot to compile the binary automatically. The ransomware module is the most expensive of all (at $490/year), but channel members can purchase the crypto miner for less than $100/year.

A deep-dive analysis of the infostealer module also highlights the versatility of the malware. According to researchers, this single utility can be used to harvest various data from a diverse range of apps, from web browsers and crypto wallets to VPN clients, messaging apps and more.

Worryingly, the Eternity Project toolkit is supposedly capable of bypassing antivirus and endpoint protection services too, a claim corroborated by Virus Total tests. Researchers at Cyble, the company responsible for identifying the threat, also say the malware is actively circulating in the wild.

Despite the range of threats posed by Eternity Project malware, Cyble says there are a few ways people can protect themselves. The best-practice advice includes maintaining regular data backups, ensuring software is always up to date and refraining from opening untrusted links and email attachments.

Via BleepingComputer

TOPICS
Joel Khalili
News and Features Editor

Joel Khalili is the News and Features Editor at TechRadar Pro, covering cybersecurity, data privacy, cloud, AI, blockchain, internet infrastructure, 5G, data storage and computing. He's responsible for curating our news content, as well as commissioning and producing features on the technologies that are transforming the way the world does business.

Read more
An American flag flying outside the US Capitol building against a blue sky
US military and defense contractors hit with Infostealer malware
A white padlock on a dark digital background.
Developers targeted by malicious Microsoft VSCode extensions
ransomware avast
“Every organization is vulnerable” - ransomware dominates security threats in 2024, so how can your business stay safe?
Android phone malware
Over 25 new malware variants created every single hour as smart device cyberattacks more than double in 2024
Illustration of a laptop with a magnifying glass exposing a beetle on-screen
Microsoft Outlook targeted by new malware attacks allowing sneaky hijacking
A person at a laptop with a cybersecure lock symbol floating above it.
Cybercrime gang targets victims with "triple threat" attacks
Latest in Security
DeepSeek on a mobile phone
More US government departments ban controversial AI model DeepSeek
Ransomware
Fortinet firewall bugs are being targeted by LockBit ransomware hackers
Trojan
Microsoft warns of a devious new RAT malware which can avoid detection with apparent ease
NordProtect logo
Standalone identity theft protection from Nord Security is now available
A man holds a smartphone iPhone screen showing various social media apps including YouTube, TikTok, Facebook, Threads, Instagram and X
Ofcom cracks down on UK tech firms, will issue sanctions for illegal content
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
These fake GitHub "security alerts" could actually let hackers hijack your account
Latest in News
Lego Pokemon
Pokemon and Lego announce the most electrifying collaboration of all time and I’m going to be first in line
Apple Watch app health
Apple Watch blood pressure monitoring tech revealed in patent
Using Zipped files and folders in Windows 11
Hidden clues suggest Microsoft is moving another part of Windows 11’s Control Panel to the Settings app – and this time it’s mouse options
Core Time 2 and COre 2 Duo watches running Pebble OS
Pebble is back! Pebble founder announces two new smartwatches, and they're basically the opposite of an Apple Watch in every way
an image of the Samsung Galaxy S24 Ultra
Finally! One UI 7 has a release date - here are the Samsung phones that’ll get it first
Google Cloud logo
Google to acquire cloud security platform Wiz in $32 billion deal