Venom

Malware updated 3 months ago (2024-11-29T14:40:20.523Z)
Download STIX
Preview STIX
Venom is a malicious software (malware) that has been associated with the hacker group Seedworm since at least mid-2022. It was described by Microsoft as Seedworm’s “tool of choice,” often delivered via a custom build of Venom Proxy in its activities. The malware was used in conjunction with other tools such as the SimpleHelp remote access tool, Venom Proxy, and a custom keylogging tool. Additionally, it utilized publicly available and living-off-the-land tools to infiltrate and exploit targeted systems. The Venom malware was also used in ransomware-as-a-service (RaaS) operations, indiscriminately targeting school districts, financial firms, critical infrastructure, and others with data theft and double extortion. The Venom malware has been implicated in several high-profile cases, including a lawsuit against 23andMe, which focused on the company’s allegedly inadequate security protocols and slow response to a Venom-related hack. In another instance, the attackers set up a command and control mechanism for an attack using open source reverse proxy tools like Fast Reverse Proxy (FRP), a customized version of the Socks Linux server, and Venom. This penetration-testing tool was used for running security audits, further demonstrating its versatility and threat potential. In the cybercriminal underworld, Venom Drainer, a successor to Monkey Drainer, emerged as a significant player. After Monkey Drainer was exposed by digital detective outfit ZackXBT and ceased operations in March 2023, most users migrated to Venom Drainer until it too closed in April 2023. During its operation, Venom Drainer reportedly amassed $27 million in stolen cryptocurrency, according to Scam Sniffer. Interestingly, Venom Drainer emerged just a day before Monkey Drainer's closure, suggesting a planned transition to this newer group. Despite its eventual shutdown, the legacy of Venom Drainer continued as it was recommended to aspiring cybercriminals seeking to continue in this line of work.
Description last updated: 2024-09-03T16:16:17.586Z
What's your take? (Question 1 of 4)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Proxy
Loader
Malware
Rat
Drainer
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Venom Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
Securityaffairs
2 months ago
DARKReading
2 months ago
Fortinet
6 months ago
Fortinet
10 months ago
CERT-EU
a year ago
DARKReading
2 years ago
CERT-EU
a year ago
DARKReading
a year ago
BankInfoSecurity
a year ago
CERT-EU
a year ago
CERT-EU
2 years ago
Unit42
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
MITRE
2 years ago
CERT-EU
a year ago