Pixel perfect Ghostpulse malware loader hides inside PNG image files

Pixel perfect Ghostpulse malware loader hides inside PNG image files

October 22, 2024 at 01:33AM

Ghostpulse malware has updated its delivery method, now embedding payloads within the pixels of PNG files, enhancing evasion of detection tools. This sophisticated technique allows it to act as a loader for more dangerous malware like Lumma, compelling defenses to evolve accordingly. Attackers also use social engineering tricks for distribution.

### Meeting Takeaways on Ghostpulse Malware

1. **Evolution of Ghostpulse**:
– Ghostpulse now retrieves its main payload via the pixels of a PNG image file, marking a significant change since its launch in 2023.
– Previous methods involved hiding malicious payloads within the IDAT chunk of a PNG file, but the current version directly parses image pixels.

2. **Detection Challenges**:
– The new pixel retrieval method makes Ghostpulse even harder to detect than its earlier versions, which were already difficult to intercept.
– The malware constructs a byte array using the RGB values of the image pixels and utilizes standard Windows APIs, complicating detection efforts.

3. **Malicious Techniques**:
– Victims are often tricked into visiting attacker-controlled websites and are manipulated into entering keyboard shortcuts that copy malicious JavaScript to their clipboard, subsequently executing a PowerShell script to download Ghostpulse.
– This process combines social engineering with the technical sophistication of the malware itself.

4. **Relationship with Lumma**:
– Ghostpulse is typically used as a loader for more dangerous malware, particularly Lumma, which is described as a potent malware-as-a-service targeting sensitive data, including cryptocurrency and two-factor authentication systems.

5. **Enhanced Threat Landscape**:
– Both Ghostpulse and Lumma represent increasing sophistication in cybercrime, with Lumma being available for purchase as a service starting at $250 and rising significantly for advanced capabilities.
– The emergence of such malware indicates a rising threat level to organizations and individuals.

6. **Defense Recommendations**:
– Organizations that have implemented the YARA rules released by Elastic last year may still be protected against Ghostpulse’s final infection stage. Updated YARA rules have also been released to catch Ghostpulse earlier in its operation.
– Continuous adaptation of tools and techniques is essential for defenders to keep pace with evolving cyber threats.

### Conclusion
The Ghostpulse malware has significantly evolved, highlighting the need for updated security measures and vigilance against increasingly sophisticated cyberattack strategies.

Full Article