Home Artists Posts Import Register

Downloads

Content

This is your exclusive bonus story just for patrons. Thank you for supporting this weekly content, and make sure to check out all the other perks that come with your membership!

We now have intel on a new malware as a service toolkit called Eternity Project. This is a modular malware toolkit allowing for attackers to use it as an info stealer, cryptominer, ransomware, a worm, and soon DDoS bot capabilities will be added as a new feature. Eternity Project is being shared and sold via a 500+ user telegram channel. You may think this tool is sold for tons of money, but it sells for $260/year plus additional fees for extra feature addons.

What makes this malware as a service interesting and unique is it’s ease of use. The sellers offer customer support, automated binary building, instructions and tutorials, and ongoing updates. That means that pretty much anyone could figure out how to use it and given the inexpensive price tag, anyone with some coin could buy it.

Researchers at Cyble have indicated that the code looks similar to code on Github called DynamicStealer, just repurposed. Another repurpose of this code called Jester Stealer has started to be used in active attacks against Ukraine, and it’s possible we’d see the same with this Eternity Project. Cyble recommends using the usual prevention techniques to defend against malware attacks like automatic backups and updates, using good security hygiene, and not clickin’ on weird links in your email. They’ve also added indicators of compromise to their blog entry about this new malware, linked right here on Patreon.

Thanks again for listening and trust your technolust.

https://blog.cyble.com/2022/05/12/a-closer-look-at-eternity-malware/

https://www.bleepingcomputer.com/news/security/eternity-malware-kit-offers-stealer-miner-worm-ransomware-tools/

https://threatpost.com/telegram-spread-eternity-maas/179623/

https://thehackernews.com/2022/05/researchers-warn-of-eternity-project.html

Comments

No comments found for this post.