Don't believe everything you read - hackers are pushing malware via media, news sites

A white padlock on a dark digital background.
(Image credit: Shutterstock.com)

Hackers with an apparently novel sense of creativity have been found hiding malicious code on legitimate platforms such as video and news sites, security researchers are warning.

Cybersecurity researchers from Mandiant have published a new report detailing the campaigns. As per the writeup, a threat actor labeled as UNC4990 was holding malicious payloads in plain sight - in forum user profiles, video descriptions, and similar. 

Consumers visiting these websites and pages were at no risk, however. For them, the payload was nothing more than lines of benign text that made no difference.

Grabbing crypto

To turn that text into something dangerous, the attackers deployed a USB drive hosting a malicious .LNK shortcut. When activated, the file executes a PowerShell script called explorer.ps1, which then downloads a secondary payload that decodes to a URL which ultimately downloads and installs the malware downloader EMPTYSPACE.

Finally, EMPTYSPACE downloads QUIETBOARD, a sophisticated backdoor that can run commands, Python code, change the contents of the clipboard, infect removable drives, grab screenshots and system information, and more. 

The motives seem to be material, Mandiant says. QUIETBOARD was used, among other things, to monitor the victim devices for cryptocurrency wallets being copied and pasted. In that case, the backdoor would replace the wallet address with the one belonging to the attackers, having the victims send their funds to the wrong recipient. Besides, Mandiant observed hackers using EMPTYSPACE to deliver other cryptocurrency miners, earning at least $55,000 for their efforts. 

There are numerous advantages to hiding payloads on legitimate platforms, Mandiant concluded, including the fact that they’re trusted by security systems and allow hackers to hide malicious traffic in a huge stream of otherwise legitimate traffic.

Since the researchers discovered the campaign, most of the malicious code has been removed. However, hackers can simply reintroduce it elsewhere, which is another huge advantage of this approach.

Via BleepingComputer

More from TechRadar Pro

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Trojan
Hackers hide malware into website images to go unnoticed
botnet
YouTubers targeted by blackmail campaign to promote malware on their channels
A digital representation of a lock
Security experts are being targeted with fake malware discoveries
A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.
Fake Reddit sites found pushing Lumma Stealer malware
Representational image of a cybercriminal
Criminals are spreading malware disguised as DeepSeek AI
DeepSeek
Fake DeepSeek installers are infecting your device with dangerous malware
Latest in Security
Microsoft
"Another pair of eyes" - Microsoft launches all-new Security Copilot Agents to give security teams the upper hand
Lock on Laptop Screen
Medusa ransomware is able to disable anti-malware tools, so be on your guard
An abstract image of digital security.
Fake file converters are stealing info, pushing ransomware, FBI warns
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Coinbase targeted after recent Github attacks
hacker.jpeg
Key trusted Microsoft platform exploited to enable malware, experts warn
IBM office logo
IBM to provide platform for flagship cyber skills programme for girls
Latest in News
Zendesk Relate 2025
Zendesk Relate 2025 - everything you need to know as the event unfolds
Disney Plus logo with popcorn
You can finally tell Disney+ to stop bugging you about that terrible Marvel show you regret starting
Google Gemini AI
Gemini can now see your screen and judge your tabs
Girl wearing Meta Quest 3 headset interacting with a jungle playset
Latest Meta Quest 3 software beta teases a major design overhaul and VR screen sharing – and I need these updates now
Philips Hue
Philips Hue might be working on a video doorbell, and according to a new report, we just got our first look at it
Microsoft
"Another pair of eyes" - Microsoft launches all-new Security Copilot Agents to give security teams the upper hand