{"id":27493,"date":"2024-10-04T11:06:48","date_gmt":"2024-10-04T11:06:48","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=27493"},"modified":"2024-10-04T11:06:48","modified_gmt":"2024-10-04T11:06:48","slug":"fakeupdate-campaign-warmcookie-virus-france","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/fakeupdate-campaign-warmcookie-virus-france\/","title":{"rendered":"FakeUpdate Campaign Spreads WarmCookie Virus in France"},"content":{"rendered":"<p><strong>FakeUpdate, a campaign of fake browser updates<\/strong> that pops up during regular Internet browsing, now targets users from France. The final target of the campaign appears to be deployment of WarmCookie backdoor, a recently discovered malware specimen.<\/p>\n<h2>FakeUpdate Spreads WarmCookie as Chrome, Edge Updates<\/h2>\n<p>Researchers at Gen Threat Labs <a href=\"https:\/\/x.com\/GenThreatLabs\/status\/1840762181668741130\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">have uncovered a campaign<\/a> spreading the WarmCookie backdoor. The core of the is a previously known FakeUpdate, that involves tricking victims into <strong>downloading and running a fake web browser update<\/strong>. As I\u2019ve mentioned in the introduction, these attacks are currently targeting users in France. Besides popular browsers like Google Chrome, Mozilla Firefox, and Microsoft Edge, the campaign also offers \u201cupdates\u201d for apps like Java, VMware Workstation, Proton VPN, and WebEx. To do this, attackers hack or create websites that display fake web browser update requests. And, sure enough, as one follows the demand, they receive a malicious program under the guise of browser update.<\/p>\n<figure id=\"attachment_27498\" aria-describedby=\"caption-attachment-27498\" style=\"width: 1200px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/fake-Edge-update-site.webp\" alt=\"FakeUpdate site screenshot\" width=\"2158\" height=\"1776\" class=\"size-full wp-image-27498\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/fake-Edge-update-site.webp 2158w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/fake-Edge-update-site-300x247.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/fake-Edge-update-site-1024x843.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/fake-Edge-update-site-768x632.webp 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/fake-Edge-update-site-1536x1264.webp 1536w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/fake-Edge-update-site-2048x1685.webp 2048w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/fake-Edge-update-site-860x708.webp 860w\" sizes=\"auto, (max-width: 2158px) 100vw, 2158px\" \/><figcaption id=\"caption-attachment-27498\" class=\"wp-caption-text\">Fake browser update site<\/figcaption><\/figure>\n<p>In fact, FakeUpdate campaign is not entirely new, as previous similar campaigns have circulated online. It is also not new for WarmCookie to use tricky and unusual spreading schemes. Researchers previously <a href=\"https:\/\/www.elastic.co\/security-labs\/dipping-into-danger\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">encountered this backdoor<\/a> being distributed under the guise of job offers. This time, however, aside from the new distribution method, there is an updated version of WarmCookie. It can now enable data and file theft, device profiling, program enumeration (through the Windows Registry), arbitrary command execution via CMD, screenshot capture, and additional malware installation capabilities.<\/p>\n<h2>FakeUpdate France Campaign Details<\/h2>\n<p>In brief, the FakeUpdate site is designed to mimic the real one, featuring a pretty convincing URL. As of the time of writing, the site edgeupgrade[.]com was still operational. Clicking the Update button downloads an installation file &#8220;Install_x64.exe&#8221;, which is the WarmCookie backdoor. According to the researchers&#8217; report, once launched, the malware performs standard checks for a virtual environment. If no virtual environment is detected, it gathers the system fingerprint and sends it to <a href=\"https:\/\/gridinsoft.com\/command-and-control\">the attackers&#8217; C2 server<\/a>.<\/p>\n<figure id=\"attachment_27500\" aria-describedby=\"caption-attachment-27500\" style=\"width: 1465px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/GYuyeG8WgAAcU9i.jpeg\" alt=\"WarmCookie infection chain screenshot\" width=\"1465\" height=\"678\" class=\"size-full wp-image-27500\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/GYuyeG8WgAAcU9i.jpeg 1465w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/GYuyeG8WgAAcU9i-300x139.jpeg 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/GYuyeG8WgAAcU9i-1024x474.jpeg 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/GYuyeG8WgAAcU9i-768x355.jpeg 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/GYuyeG8WgAAcU9i-860x398.jpeg 860w\" sizes=\"auto, (max-width: 1465px) 100vw, 1465px\" \/><figcaption id=\"caption-attachment-27500\" class=\"wp-caption-text\">WarmCookie infection chain (source: Gen Threat Labs)<br \/><\/figcaption><\/figure>\n<p>As previously mentioned, this backdoor provides attackers with <strong>unrestricted access to the compromised system<\/strong>. The latest campaign observed by Gen Threat Labs shows WarmCookie has been upgraded with new capabilities. Among others, running DLLs from the temp folder and transmitting the output, alongside the ability to transfer and execute EXE and PowerShell files. Beyond basic data theft, attackers can also deliver payloads <a href=\"https:\/\/gridinsoft.com\/ransomware\">like ransomware<\/a>.<\/p>\n<p>Regarding legitimate web browser updates, all modern browsers on Windows are now automatically updated. This eliminates the need to download any installation files manually \u2013 the user may only need <strong>to restart the browser<\/strong>.<\/p>\n<h2>How to Stay Protected?<\/h2>\n<p>As this campaign has several distinct milestones in user interaction, the key to avoiding this threat will be in proactive counteraction. First and most effective solution is <strong>to remain vigilant while browsing the web<\/strong>. Even with highly convincing phishing campaigns, exercise caution when prompted to download or update software. Instead, always visit the official website of the application you intend to update.<\/p>\n<p>Another proactive option is <strong>to use advanced anti-malware software<\/strong> with built-in Internet security. If the first precaution is overlooked, anti-malware software will block access to phishing pages. GridinSoft Anti-Malware offers advanced protection, including an Internet Security feature, making it a strong option to consider.<\/p>\n<p style=\"padding-top:15px;padding-bottom:15px;\"><a href=\"\/download\/antimalware\" rel=\"nofollow\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"\/blogs\/wp-content\/uploads\/2022\/07\/env02.webp\" alt=\"FakeUpdate Campaign Spreads WarmCookie Virus in France\" width=\"798\" height=\"336\" class=\"aligncenter size-full\" title=\"\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>FakeUpdate, a campaign of fake browser updates that pops up during regular Internet browsing, now targets users from France. The final target of the campaign appears to be deployment of WarmCookie backdoor, a recently discovered malware specimen. FakeUpdate Spreads WarmCookie as Chrome, Edge Updates Researchers at Gen Threat Labs have uncovered a campaign spreading the [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":27503,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[625,810,373,16],"class_list":{"0":"post-27493","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-backdoor","9":"tag-browser","10":"tag-update","11":"tag-windows"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/FakeUpdate-campaign-targets-France-with-WarmCookie-backdoor.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/27493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=27493"}],"version-history":[{"count":10,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/27493\/revisions"}],"predecessor-version":[{"id":27510,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/27493\/revisions\/27510"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/27503"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=27493"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=27493"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=27493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}