Track Common Adversary Tasks Performed Using Azorult

 






To know more about it, you can go through my detailed document by clicking here








Overview

Azorult, a commercial trojan that steals sensitive information from the compromised systems and send it to the C&C server, was observed in 2016 and targeted the North American users via a spearphishing campaign in July 2018. It can collect various data like, browser history, login credentials, cookies, cryptowallet files, etc. 

How Does it Works?

As the malware spreads via spearphishing email campaigns that contains malicious attachments, and, when the users opens them, these files prompt them to enable macro commands or the content will not be shown. When the users enables these macro commands, the commands stealthily downloads as well as install Azorult trojan. However, there is a catch, if the users open these malicious files via a program other than MS Office Tools, then, they won't open; in fact, Azorult only targets MS Windows, hence users of the other platforms are completely safe from it.

Mitigation

The following steps might help you in mitigating this cyber threat:

  • Be very careful while browsing the internet.

  • Carefully analyze all the email attachments and don't ever open any kind of suspicious/unrecognizable email addresses.

  • The installed applications must be updated via the implemented tools or functions offered by the official developer only.

  • Always download/install a software or program via official sources only.

  • Install a reputable anti-virus/anti-spyware software in your system.













To know more about it, you can go through my detailed document by clicking here






































Comments

Popular posts from this blog

Deployment (Part 3)

Deployment (Part 1)

Deployment (Part 2)