Malware, Threat Intelligence

More advanced Snake Keylogger variant emerges

Windows systems in Asia and Europe have been predominantly subjected to attacks with a new, more sophisticated iteration of the Snake Keylogger information-stealing malware, according to The Register.

Despite featuring the same keystroke logging, screenshot capturing, and clipboard data gathering capabilities as earlier versions, such novel Snake Keylogger variant leverages an AutoIT-compiled binary as an executable file, which allows more effective concealment of malicious activity, a report from Fortinet FortiGuard Labs showed. Execution of the updated Microsoft .NET-based data stealer also facilitates self-copying and further obfuscation before leading to the deployment of another file supporting automated execution of Snake Keylogger upon system reboot. "This method is commonly used because the Windows Startup folder allows scripts, executables, or shortcuts to run without required administrative privileges. By leveraging this technique, Snake Keylogger can maintain access to the compromised system and re-establish a foothold even if the malicious process is terminated," said Fortinet FortiGuard Labs researcher Kevin Su.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds