{"id":13704,"date":"2023-03-09T18:51:43","date_gmt":"2023-03-09T18:51:43","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=13704"},"modified":"2023-03-09T18:53:30","modified_gmt":"2023-03-09T18:53:30","slug":"imbetter-information-stealer","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/imbetter-information-stealer\/","title":{"rendered":"ImBetter: New Information Stealer Spotted Targeting Cryptocurrency Users"},"content":{"rendered":"<p><ins datetime=\"2023-03-09T18:42:38+00:00\"><\/p>\n<p>Today, phishing sites are commonplace. But unfortunately, this seemingly old, deceptive tactic, which everyone seemed to have figured out long ago, still brings enormous profits to scammers today. The problem is that while Internet users are becoming more cautious, cyber scammers are developing more sophisticated ways to trick them. One such method is ImBetter malware. The authors of such malware use sophisticated techniques when creating their phishing websites <strong>to make them appear legitimate and appealing to users<\/strong>.<\/p>\n<h2>What is ImBetter malware?<\/h2>\n<p>ImBetter Stealer is <a href=\"https:\/\/gridinsoft.com\/malware\">the name of malware<\/a> whose mission, as its name suggests, is to steal information. Not so long ago, researchers came across some phishing websites that targeted Windows users. These websites imitate popular crypto wallets and online file converters. However, <strong>instead of its purported function, they trick users<\/strong> into downloading the &#8220;ImBetter Stealer&#8221; malware. This malware targets sensitive data such as cryptocurrency wallets, browser credentials, and session cookies. In addition, it can take screenshots of the system and send them to the C&#038;C server.<\/p>\n<h2>ImBetter Malware Spreading<\/h2>\n<p>Researchers discovered that the main channel for spreading ImBetter are malicious sites <a href=\"https:\/\/gridinsoft.com\/phishing\">masquerading as well-known legit<\/a> cryptocurrency sites, such as MetaMask, etc., and online file format converters. Nevertheless, experts do not rule out that ImBetter also uses other distribution methods, such as phishing <a href=\"https:\/\/gridinsoft.com\/social-engineering\">and social engineering<\/a>. In some cases, this malware is getting bundled with <strong>pirated software or is supplied instead of it<\/strong>. In turn, sites that distribute pirated programs are promoted via spam mailings, <a href=\"https:\/\/gridinsoft.com\/blogs\/dns-cache-poisoning-and-dns-spoofing\/\">search engine poisoning<\/a>, malicious browser pop-ups, etc.<\/p>\n<figure id=\"attachment_13719\" aria-describedby=\"caption-attachment-13719\" style=\"width: 724px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/03\/metamask-fake-page.webp\" alt=\"Fake Metamask page example\" width=\"724\" height=\"482\" class=\"size-full wp-image-13719\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/03\/metamask-fake-page.webp 724w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/03\/metamask-fake-page-300x200.webp 300w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><figcaption id=\"caption-attachment-13719\" class=\"wp-caption-text\">Fake Metamask page that spreads ImBetter malware<\/figcaption><\/figure>\n<p>However, the infection process only begins <strong>when a visitor interacts with the website by clicking on a specific content<\/strong>. The ImBetter Stealer malware binary is a 32-bit GUI-based executable file. Immediately after starting the execution, the malware obtains language and region data for the system. If the malware detects <strong>Russian, Moldova, Belarusian, Bashkir, Tatar, Kazakh, or Yakut region\/languages<\/strong> after checking the LCID code of the infected system, it would stop further execution. This clearly hints at the virus&#8217;s origin and indicates that the attackers are Russian-speaking.<\/p>\n<h2>ImBetter Data Stealing<\/h2>\n<p>Suppose the system victim does not belong to any of the above regions. In that case, ImBetter takes a screenshot of the infected system\u2019s desktop and saves it to the <strong>C:\\Users\\Public<\/strong> folder with the image name &#8220;<strong>Scr-urtydcfgads.png<\/strong>&#8220;. The malware will then send this screenshot <a href=\"https:\/\/gridinsoft.com\/command-and-control\">to attackers on the C&#038;C server<\/a>. ImBetter then creates a socket connection to the C&#038;C IP address, after which it can obtain the <strong>hardware ID, CPU, GPU, and system memory size<\/strong>, as well as screen and name information from the infected system. Each type of system information is saved separately as a string of key-value pairs in memory and then encoded in Base64 format and sent to the C&#038;C server.<\/p>\n<p>Following system information, the malware checks for the presence of <a href=\"https:\/\/www.chromium.org\/chromium-projects\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Chromium-based web browsers<\/a> installed in the system. ImBetter is interested in the following web browsers:<\/p>\n<div class=\"su-row\">\n<div class=\"su-column su-column-size-1-2\"><div class=\"su-column-inner su-u-clearfix su-u-trim\">\n<ul>\n<li>Google Chrome<\/li>\n<li>Edge<\/li>\n<li>Opera Stable<\/li>\n<li>Vivaldi<\/li>\n<li>AcWebBrowser<\/li>\n<li>Epic Browser<\/li>\n<li>Titan Browser<\/li>\n<li>Baidu Spark<\/li>\n<li>CoolNovo<\/li>\n<li>Yandex<\/li>\n<\/ul>\n<\/div><\/div>\n<div class=\"su-column su-column-size-1-2\"><div class=\"su-column-inner su-u-clearfix su-u-trim\">\n<ul>\n<li>Torch<\/li>\n<li>BlackHawk<\/li>\n<li>Comodo Dragon<\/li>\n<li>Rockmelt<\/li>\n<li>Brave<\/li>\n<li>Sleipnir<\/li>\n<li>CentBrowser<\/li>\n<li>Go!<\/li>\n<li>SRWare Iron<\/li>\n<li>Flock<\/li>\n<\/ul>\n<\/div><\/div>\n<\/div>\n<p>There is a pretty straightforward reason for attacking these browsers. Their popularity increases the chance of finding something valuable among the browser files \u2013 like passwords, user accounts, cookies and so forth. By default, this information is stored in the <strong>AppData\/Local\/%BrowserName%<\/strong> directory, the one that is created during its installation. It contains <strong>login credentials, cookies, stored credit card numbers, user profiles, and cryptocurrency extensions<\/strong>. Cybercriminals do all this for one purpose &#8211; to gain control over the victim&#8217;s personal information and\/or funds.<\/p>\n<h2>How to avoid malware?<\/h2>\n<p>The following cybersecurity tips create a first line of defense against attackers. We recommend that you follow the next tips to reduce the risk of ImBetter infection, as well as other malware:<\/p>\n<ul>\n<li><strong>Download from trusted sources<\/strong>. Avoid downloading and using pirated software <a href=\"https:\/\/gridinsoft.com\/blogs\/torrenting-is-it-legal\/\">from warez\/torrent websites<\/a>. Most cracked programs contain malware.<\/li>\n<li><strong><a href=\"https:\/\/gridinsoft.com\/blogs\/use-strong-passwords-to-cant-be-hacked\/\">Use strong passwords<\/a><\/strong>. Using easy-to-guess or predictable passwords makes it easy for crooks to crack your password by brute force.<\/li>\n<li><strong><a href=\"https:\/\/gridinsoft.com\/mfa\">Use Multifactor Authentication<\/a><\/strong>. Suppose attackers discovered or cracked your password and tried logging into your account. The system will send you a notification to your phone and a one-time confirmation code. Without it, attackers cannot log in to your account.<\/li>\n<li><strong>Always install the latest updates on your devices<\/strong>. Updates contain important security fixes and sometimes new features. Therefore, we recommend enabling automatic software updates on your computer and smartphone.<\/li>\n<li><strong><a href=\"https:\/\/gridinsoft.com\/antimalware\">Use reliable anti-malware software<\/a><\/strong>. This way, antivirus software blocks and removes malicious files while downloading.<\/li>\n<li><strong>Please do not click on links from emails<\/strong> <a href=\"https:\/\/gridinsoft.com\/blogs\/dangers-of-spam-email\/\">or open email attachments<\/a> unless you know their authenticity.<\/li>\n<\/ul>\n<p style=\"padding-top:15px;padding-bottom:15px;\"><a href=\"\/download\/antimalware\" rel=\"nofollow\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"\/blogs\/wp-content\/uploads\/2022\/07\/env01.webp\" alt=\"ImBetter: New Information Stealer Spotted Targeting Cryptocurrency Users\" width=\"798\" height=\"336\" class=\"aligncenter size-full\" title=\"\"><\/a><\/p>\n<h3>Tips for organizations:<\/h3>\n<ul>\n<li><a href=\"https:\/\/gridinsoft.com\/blogs\/remote-work-security-tips\/\">Train employees to identify threats<\/a> such as phishing\/insecure URLs.<\/li>\n<li>Monitor the beacon on the network level to block data exfiltration by malware or TAs.<\/li>\n<li>Use blocking URLs that employees may use to download malware, such as Torrent\/Warez.<\/li>\n<li><a href=\"https:\/\/gridinsoft.com\/blogs\/data-loss-prevention\/\">Use data loss prevention<\/a> (DLP) solutions on employee systems.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Today, phishing sites are commonplace. But unfortunately, this seemingly old, deceptive tactic, which everyone seemed to have figured out long ago, still brings enormous profits to scammers today. The problem is that while Internet users are becoming more cautious, cyber scammers are developing more sophisticated ways to trick them. One such method is ImBetter malware. [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":13711,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[4],"tags":[41,619,40,131,670],"class_list":{"0":"post-13704","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips-tricks","8":"tag-cryptocurrency","9":"tag-cybersecurity","10":"tag-online-security","11":"tag-phishing","12":"tag-threats"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/03\/GS_Blog_banner_ImBetter_-New-Information-Stealer-Spotted-Targeting-Cryptocurrency-Users.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/13704","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=13704"}],"version-history":[{"count":16,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/13704\/revisions"}],"predecessor-version":[{"id":13723,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/13704\/revisions\/13723"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/13711"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=13704"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=13704"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=13704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}