Passwordstate Hackers Phish For More Victims With Updated Malware
Click Studios, the software company behind the Passwordstate enterprise password manager, is warning customers of ongoing phishing attacks targeting them with updated Moserpass malware.
Last week, the company notified its users that attackers successfully compromised the password manager’s update mechanism to deliver info-stealing malware known as Moserpass to a yet undisclosed number of customers between April 20 and April 22.
Click Studios published a second advisory on Sunday, saying that “only customers that performed In-Place Upgrades between the times stated above are believed to be affected and may have had their Passwordstate password records harvested.”
Also Read: 15 Best Tools For Your Windows 10 Privacy Settings Setup
Phishing messages copy Click Studios emails shared on social media
Since then, Click Studios has been assisting potentially impacted customers over email, providing them with a hotfix designed to help them remove the malware from their systems.
However, as revealed today in a new advisory, emails received from Click Studios were shared by customers on social media allowing unknown threat actors to create phishing emails matching the company’s correspondence and pushing a new Moserpass variant.
“It is expected the bad actor is actively monitoring social media for information on the compromise and exploit,” Click Studios said today.
“It is important customers do not post information on Social Media that can be used by the bad actor. This has happened with phishing emails being sent that replicate Click Studios email content.”
The ongoing phishing attack attempting to infect more Passwordstate customers with the Moserpass data theft malware has reportedly only targeted a small number of customers.
The company now asks those receiving suspicious emails “to stay vigilant and ensure the validity of any email” they receive.
” If you are unsure if an email is from us, send it to Technical Support as an attachment, for confirmation,” Click Studios added.
The phishing attack is requesting customers to download a modified hotfix Moserware.zip file,from a CDN Network not controlled by Click Studios, that now appears to have been taken down.Initial analysis indicates this has a newly modified version of the malformed Moserware.SecretSplitter.dll, that on loading then attempts to use an alternate site to obtain the payload file. We are still analysing this payload file. — Click Studios
Also Read: Going Beyond DPO Meaning: Ever Heard of Outsourced DPO?
Customers urged to reset all stored passwords
The Moserpass malware is designed to collect and exfiltrate both system information and password data extracted from Passwordstate’s database, including:
- Computer Name, User Name, Domain Name, Current Process Name, Current Process Id, All running Processes name and ID, All running services name, display name and status, Passwordstate instance’s Proxy Server Address, Username and Password
- Title, UserName, Description, GenericField1, GenericField2, GenericField3, Notes, URL, Password
0 Comments