Malware, Threat Intelligence, Phishing

Newly emergent OBSCURE#BAT malware campaign uncovered

Researchers warn that tools using the BatCloak component are becoming increasingly popular with adversaries, making the already difficult task of detecting BAT files harder. (Image credit: Vector illustration via Getty Images)

Hackread reports that organizations and individuals in the U.S., Canada, Germany, and the UK have been mainly targeted by the nascent OBSCURE#BAT malware campaign, which spreads malicious payloads via social engineering and counterfeit software downloads.

Attackers behind the OBSCURE#BAT use fake CAPTCHAs in typosquatted domains and spoofed software to lure targets into executing malware that not only establishes scheduled tasks but also performs Windows Registry alterations to allow operation following system rebooting, according to an investigation from Securonix Threat Labs. Malicious activity is then obscured by the malware through a user-mode rootkit.

Additional techniques utilized by the malware campaign to evade detection include API hooking that enables file, registry entry, and running process concealment; registry manipulation through fake driver registration; and clandestine logging activities.

Defending against the OBSCURE#BAT campaign requires downloading software only from legitimate sites, leveraging endpoint logging and threat detection tools, and tracking suspicious system activity, said researchers.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds