Share this article on:
Over 30,000 computers across 195 countries have been hit by a newly exposed spyware threat.
Global cyber security giant Kaspersky has uncovered “PseudoManuscrypt” – a new malware threat, which was blocked by the company on 35,000 computers across 195 countries between January and November 2021.
The threat contains similar features to the advanced persistent threat (APT) group Lazarus’ Manuscrypt malware.
Victims of PseudoManuscrypt reportedly include government organisations and industrial control systems across numerous industries.
Some of the impacted organisations were military-industrial enterprises and research laboratories, 7.2 per cent of attacked computers are part of industrial control systems (ICS).
Engineering and building automation represented the most affected industries.
According to Kaspersky, PseudoManuscrypt is initially downloaded on targets’ systems via fake pirated software installer archives, some of which are for ICS-specific pirated software.
The fake installers could be offered via a Malware-as-a-Service (MaaS) platform, and in some cases, installed via the Glupteba botnet.
Following initial infection, a complicated infection chain is initiated that eventually downloads the main malicious module.
Two variants of this module have been identified, both capable of advanced spyware capabilities, including logging keystrokes, copying data from the clipboard, stealing VPN (and potentially RDP) authentication credentials and connection data and copying screenshots.
Kaspersky has recommended organisations to:
“This is a highly unusual campaign, and we are still piecing together the various information we have,” Vyacheslav Kopeytsev, security expert at Kaspersky said.
“However, one fact is clear: this is a threat that specialists need to pay attention to.
“It has been able to make its way onto thousands of ICS computers, including many high-profile organisations. We will be continuing our investigations, keeping the security community apprised [of] any new findings.”