Dolphin malware discovered by researchers

Share post:

Dolphin, a sophisticated backdoor discovered by ESET researchers, expands the ScarCruft APT group’s arsenal with a wide range of spying capabilities, including monitoring drives and portable devices and exfiltrating files of interest, keylogging and taking screenshots, and stealing credentials from browsers.

Its functionality is restricted to specific targets, to which the backdoor is deployed following an initial compromise with less sophisticated malware. Dolphin makes extensive use of cloud storage services, particularly Google Drive, for command-and-control communication.

The backdoor can exfiltrate files from a path specified in a command, and it actively searches drives for files with interesting extensions and automatically exfiltrates them. In addition, the backdoor gathers basic information about the targeted machine, such as the operating system version, malware version, list of installed security products, username, and computer name.

Following the deployment of the Dolphin backdoor on selected targets, it searches the drives of compromised systems for interesting files and exfiltrates them to Google Drive. And ESET researchers have observed multiple versions of Dolphin since its initial discovery in April 2021, in which threat actors improved the backdoor’s capabilities and attempted to avoid detection.

Dolphin searches all fixed (HDD) and non-fixed (USB) drives, generates directory listings, and exfiltrates files based on their extension. Dolphin can also search for portable devices like smartphones using the Windows Portable Device API.

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

Hamilton Estimates $52 Million to Rebuild IT Systems After Ransomware Attack

The city of Hamilton plans to spend $52 million over the next three years to rebuild and secure...

Avery Data Breach: Credit Card Skimmer Affects Over 61,000 Customers

Label maker Avery has disclosed a data breach affecting 61,193 customers, caused by a credit card skimmer that...

Scammed Company Ordered to Pay $190k for Fraudulent Invoice Payment

A hacker gained access to Mobius Group’s email system and sent instructions from a legitimate email address, directing...

Sneaky 2FA: A Sophisticated Attack Defeats Both 2FA and Phishing Protections

A new phishing kit, ominously named "Sneaky 2FA," has emerged, targeting Microsoft 365 users by bypassing two-factor authentication...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways