Cromos – Download and Inject code into Google Chrome extensions

Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application and more cromos create executable files to force installation via PowerShell for example, and also upload files to dropbox to host the malicious files. Download extension Injections Upload files on dropbox Windows infection […]

Malicious Chrome Plugin Let Remote Attacker Steal keystroke and Inject Malicious Code

Researchers at Zimperium zLabs recently identified a new Chrome browser botnet called ‘Cloud9’ that is intent on stealing the following information using malicious extensions:- Online accounts credentials Log keystrokes Inject ads Inject malicious JS code Enroll the victim’s browser in DDoS attacks This method is becoming increasingly attractive for malware developers to target web browsers […]

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges and Inject Malicious Code

QNAP, the maker of network-attached storage (NAS) appliances, has recently released a warning statement that its products might be vulnerable to recent Linux vulnerabilities that could be exploited to gain access to the affected systems. The vulnerability has been tracked as CVE-2022-0847, and this security flaw is a high severity flaw. Due to this critical […]

Critical code injection vulnerabilities in VMware Spring Cloud Gateway

Cybersecurity specialists report the detection of two vulnerabilities in VMware Spring Cloud Gateway, a library for creating API gateways over Spring and Java for a flexible way to route requests based on a number of criteria. According to the report, the exploitation of these flaws could lead to dangerous hacking scenarios. Below are brief descriptions […]

Critical remote code injection and DoS vulnerabilities in Juniper’s Junos OS. Secure your network

Cybersecurity specialists report the discovery of a remote code execution (CER) vulnerability in the Steel-Belted Radius (SBR) Carrier Edition, a device developed by Juniper Networks and used by telecommunications operators for the management of network access and security policies. Tracked as CVE-2021-0276, the vulnerability resides in SBR Carrier versions 8.4.1, 8.5.0, and 8.6.0 that use […]

Buffer overflow and code injection vulnerabilities in CODESYS

Cybersecurity specialists reported the finding of at least 4 critical vulnerabilities in CODESYS V2 Runtime Toolkit, a set of tools for CODESYS, the development environment for driver programming in accordance with the international industry standard IEC 61131-3. According to the report, successful exploitation of these flaws would allow denial of service (DoS) attacks, arbitrary code […]

Drow – Injects Code Into ELF Executables Post-Build

  drow is a command-line utility that is used to inject code and hook the entrypoint of ELF executables (post-build). It takes unmodified ELF executables as input and exports a modified ELF contianing an embedded user-supplied payload that executes at runtime. Slightly more detail … Drow takes the following steps to create the new patched […]

DNCI – Dot Net Code Injector

DNCI allows the injection of .Net code (.exe or .dll) remotely in unmanaged processes in windows. 1. Project StructureThe project is structured in: DNCI.Injector.Library – Injection library. Contains all injection components and logic; DNCI.Injector.Runner – Command line utility for injection; DNCIClrLoader – C++ MicroCode to Load the .NET assembly into memory; InjectDemo.Console.ClassicNet – Demo Classic […]

ThreadBoat – Uses Thread Execution Hijacking To Inject Shellcode

  Program uses Thread Hijacking to Inject Native Shellcode into a Standard Win32 Application. With Thread Hijacking, it allows the hijacker.exe program to suspend a thread within the target.exe program allowing us to write shellcode to a thread.Usage int main() { System sys; Interceptor incp; Exception exp; sys.returnVersionState(); if (sys.returnPrivilegeEscalationState()) { std::cout << “Token Privileges […]

New Wave of EMOTET Malware Steals Financial Information by Injecting Malicious Code into Computer

Cybercriminals currently distributing a new form of EMOTET malware that targets financial and banking services to steal sensitive information by injecting malicious code into the targeted computer. The US-Cert team already issued an alert for an advanced Emotet malware attack that targets governments, private and public sectors in the most destructive way to steal various […]

New Adwind RAT Attack Linux, Windows and Mac via DDE Code Injection Technique by Evading Antivirus Software

New Adwind 3.0 RAT (Remote access Trojan) Evolving with new sophisticated capabilities, unlike old version it mainly attacks desktop version of  Linux, Windows and Mac OSX using DDE code injection technique. Attackers are using weaponized Microsoft Office documents to compromise the targeted victims and also new capabilities that able to avoid detection by anti-virus software. This attack […]

Trickbot Malware Re-emerging via MS Word Documents with Powerful Code-Injection Technique

Trickbot malware is one of the widely known Banking Trojan emerging again with sophisticated techniques to at target the various financial institutions and large bank to steal the banking credentials. The current version of Trickbot malware is spreading with a powerful code injection technique to evade the detection, anti-analysis technique and disable the security tools that run in […]

Unicorn – Downgrade Attack & Inject Shellcode Straight into Memory

Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber’s PowerShell attacks and the PowerShell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18. Usage is simple, just run Magic Unicorn (ensure Metasploit is installed if using Metasploit methods and […]

New ‘Early Bird’ Code Injection Technique

This injection technique allows the injected code to run before the entry point of the main thread of the process, thereby allowing avoiding detection by anti-malware products’ hooks. Code injection is commonly used by malware to evade detection by injecting a malicious code into a legitimate process, information security experts said. This way the legitimate process serves […]

URSNIF TROJAN ADOPTS NEW CODE INJECTION TECHNIQUE

Hackers are testing a new variation of the Ursnif Trojan aimed at Australian bank customers that utilizes novel code injection techniques. Since the summer of 2017, IBM X-Force researchers report that Ursnif (or Gozi) samples have been tested in wild by a new malware developer. The samples are a noteworthy upgrade from previous versions. “This […]

Chrome to tackle crashing issue by blocking 3rd-party software from injecting code

For the last few years, the trend of using third party software such as antivirus scanners has increased and in order to make more profit or provide additional services, companies seek additional access to user’s web browser. This results in jeopardizing browser activity by either crashing or making it slow to use. Now, Google has decided that it will […]

Linux Devices Vulnerable To Code Injection “Bad Taste”

Linux Devices Vulnerable To Code Injection. The German Security Detective (Moskopp) can find an error code injection (bad taste – CVE-2017-11421) in the X-Thumbnail Thumbnailer which may allow an attacker to execute malicious code on Linux-oriented machines. There is a defect in the GNOME X thumbnailer, and the third thumbnailer is used by GNOME files, […]