www.rivitmedia.comwww.rivitmedia.comwww.rivitmedia.com
  • Home
  • Tech News
    Tech NewsShow More
    Microsoft’s May 2025 Patch Tuesday: Five Actively Exploited Zero-Day Vulnerabilities Addressed
    7 Min Read
    Malicious Go Modules Unleash Disk-Wiping Chaos in Linux Supply Chain Attack
    4 Min Read
    Agentic AI: Transforming Cybersecurity in 2025
    3 Min Read
    Cybersecurity CEO Accused of Planting Malware in Hospital Systems: A Breach of Trust That Shocks the Industry
    6 Min Read
    Cloud Convenience, Criminal Opportunity: How Google Sites Became a Launchpad for Elite Phishing
    6 Min Read
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
  • How-To-Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
  • FREE SCAN
  • Cybersecurity for Business
Search
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2023 rivitMedia.com. All Rights Reserved.
Reading: Bazar malware is now being linked to Trickbot banking trojan campaigns
Share
Notification Show More
Font ResizerAa
www.rivitmedia.comwww.rivitmedia.com
Font ResizerAa
  • Online Scams
  • Tech News
  • Cyber Threats
  • Mac Malware
  • Cybersecurity for Business
  • FREE SCAN
Search
  • Home
  • Tech News
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
  • How-To-Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
    • Cybersecurity for Business
  • FREE SCAN
  • Sitemap
Follow US
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
malware
www.rivitmedia.com > Blog > Cyber Threats > Malware > Bazar malware is now being linked to Trickbot banking trojan campaigns
Malware

Bazar malware is now being linked to Trickbot banking trojan campaigns

riviTMedia Research
Last updated: October 24, 2023 4:23 pm
riviTMedia Research
Share
Bazar malware is now being linked to Trickbot banking trojan campaignsA strain of malware loader dubbed Bazar, which can be used to deploy additional malware and exfiltrate data, has begun targeting healthcare, manufacturing, IT, logistics and professional services companies across the United States and Europe, according to the Cybereason Nocturnus threat research team. Bazar initially emerged in April 2020 and is distributed through phishing emails exploiting subjects such as the COVID-19 pandemic. It appears to have ties to previous Trickbot campaigns, as it is being delivered through a similar infection chain and reuses associated domains. After initially establishing a bridgehead in the target environment using the loader, the backdoor establishes persistence, letting hackers deploy other payloads such as ransomware, post-exploitation frameworks such as CobaltStrike, stealing data and executing remote commands. The Cybereason Nocturnus team reports that it has found many different versions of Bazar in circulation, suggesting it is actively developed and updated by its creators, who they believe are based in Russia. Bazar malware is focused on evasion and persistence. The malware authors seem to be testing a few versions of their malware and hiding the final payload while executing it in another separate process. To further avoid detection, the Bazar loader and backdoor use a different network callback scheme from previous versions of Trickbot-related malware. The Nocturnus team also reports that Bazar was first seen in April of 2020 and then promptly disappeared for a hiatus lasting almost two months until a new version was seen in June. This demonstrates that the malware's creators had taken time to improve their code to make Bazar harder to deal with. Among other details, changes to some of the original version's more detectable features were made, such as strings that were previously hardcoded, and modifying the known shellcode decryption routine. Cybereason says that while Bazar is still in the development stage, its evolution suggests the rise of a "formidable" new threat in the near future.
SHARE

A strain of malware loader dubbed Bazar, which can be used to deploy additional malware and exfiltrate data, has begun targeting healthcare, manufacturing, IT, logistics and professional services companies across the United States and Europe, according to the Cybereason Nocturnus threat research team.

Bazar initially emerged in April 2020 and is distributed through phishing emails exploiting subjects such as the COVID-19 pandemic. It appears to have ties to previous Trickbot campaigns, as it is being delivered through a similar infection chain and reuses associated domains.

After initially establishing a bridgehead in the target environment using the loader, the backdoor establishes persistence, letting hackers deploy other payloads such as ransomware, post-exploitation frameworks such as CobaltStrike, stealing data and executing remote commands.

The Cybereason Nocturnus team reports that it has found many different versions of Bazar in circulation, suggesting it is actively developed and updated by its creators, who they believe are based in Russia.

Bazar malware is focused on evasion and persistence. The malware authors seem to be testing a few versions of their malware and hiding the final payload while executing it in another separate process. To further avoid detection, the Bazar loader and backdoor use a different network callback scheme from previous versions of Trickbot-related malware. 

The Nocturnus team also reports that Bazar was first seen in April of 2020 and then promptly disappeared for a hiatus lasting almost two months until a new version was seen in June. This demonstrates that the malware’s creators had taken time to improve their code to make Bazar harder to deal with.

Among other details, changes to some of the original version’s more detectable features were made, such as strings that were previously hardcoded, and modifying the known shellcode decryption routine. Cybereason says that while Bazar is still in the development stage, its evolution suggests the rise of a “formidable” new threat in the near future.

You Might Also Like

PracticalProject Adware: How to Remove It from Your Mac
How to Deal With Tracktransit.co.in
Euopue[.]click: A Dangerous Push Notification Scam
Vezaransomware: A Comprehensive Guide to Actions, Consequences, and Removal
LightSpy Spyware: Understanding and Removing the Threat
TAGGED:Malware

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Share
Previous Article Malware News Archive: When Brazil’s four banking trojan families, known collectively as Tetrade, went global
Next Article Fall security tips for staying safe while surfing the Web.
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Scan Your System for Free

✅ Free Scan Available 

✅ 13M Scans/Month

✅ Instant Detection

Download SpyHunter

//

Check in Daily for the best technology and Cybersecurity based content on the internet.

Quick Link

  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

www.rivitmedia.comwww.rivitmedia.com
© 2023 • rivitmedia.com All Rights Reserved.
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US