icon

Digital safety starts here for both commercial and personal Use...

Defend Your Business Against the Latest WNY Cyber Threats We offer Safe, Secure and Affordable Solutions for your Business and Personal Networks and Devices.



WNYCyber is there to help you to choose the best service providers in Western New York... We DO NOT provide the services ourselves, as we are Internet Programmers who have to deak daily with Cyber Threats... (Ugghhh)... So we know what it's like and what it takes to protect OUR and OUR CUSTOMERS DATA... We built this Website to help steer you to those that can give you the best service at realistic and non-inflated prices. We do charge or collect any fees.

Evolving Snake Keylogger Variant Targets Windows Users

Summary:
FortiGuard Labs recently detected a new variant of Snake Keylogger (also known as 404 Keylogger) using FortiSandbox v5.0 (FSAv5), this malware has been responsible for over 280 million blocked infection attempts, with the highest concentrations in China, Turkey, Indonesia, Taiwan, and Spain. The widespread activity of this keylogger highlights its global reach and evolving nature, posing a significant threat to organizations and users worldwide.

Snake Keylogger is typically distributed through phishing emails containing malicious attachments or links. Once executed, it steals sensitive credentials from popular browsers like Chrome, Edge, and Firefox by logging keystrokes, monitoring the clipboard, and extracting saved passwords. The stolen data is then exfiltrated using SMTP (email) and Telegram bots, allowing attackers to access login credentials and other private information. To evade detection, this variant leverages AutoIt scripting, making its payload more difficult to analyze. By embedding itself within an AutoIt-compiled binary, the malware effectively bypasses traditional antivirus solutions.


Security Officer Comments:
FortiSandbox’s research revealed that Snake Keylogger accesses browser credential storage folders to extract sensitive data, including autofill information and credit card details. It also retrieves victim geolocation and transmits stolen data using HTTP POST, SMTP, and Telegram bots. The malware employs an API to log keystrokes, capturing banking credentials and other personal information.


Suggested Corrections:
To mitigate the risk posed by keylogger malware, security experts recommend:

  • Email caution: Avoiding opening unsolicited email attachments or clicking unknown links
  • Updated security tools: Using antivirus software with behavior-based detection capabilities
  • Regular patching: Keeping operating systems and software up to date


Link(s):
https://www.infosecurity-magazine.com/news/snake-keylogger-targets-windows/