WailingCrab, a malware variant also known as WikiLoader, was first identified in December 2022 by Proofpoint. The stealthy malware has been extensively used in email campaigns to deliver the Gozi backdoor, particularly targeting Italian entities. It was discovered by the Unit 42 Managed Threat Hunting team being delivered via SEO poisoning and spoofing of GlobalProtect VPN software. In addition, WailingCrab misuses the MQTT Messaging Protocol, a finding highlighted in an IBM X-Force report. Interestingly, threat actors have begun using platforms like Discord for hosting malware, leading to the developers of WailingCrab adopting alternative approaches.
Persistent updates have been made to the malware by the TA544 threat operation, also known as Zeus Panda and Bamboo Spider, according to a report from SC Magazine on November 27, 2023. These updates have enhanced the stealthiness of attacks, which are primarily facilitated through shipping-themed emails. The latest version of WailingCrab leverages hacked websites for initial command-and-control communications and embeds an AES-encrypted backdoor within the malware itself, rather than relying on a separate downloader component as in previous versions.
The evolution and sophistication of WailingCrab underscore the importance of vigilance and proactive measures in combating such threats. Organizations need to stay alert to the risks posed by this and other evolving malware threats. By scrutinizing file downloads from domains like Discord, implementing robust cybersecurity measures, and maintaining up-to-date knowledge of threat operations, organizations can minimize the risk of falling victim to WailingCrab and similar malicious software.
Description last updated: 2024-10-17T12:11:58.020Z