Home Malware Programs Malware Lebal

Lebal

Posted: January 26, 2018

Threat Metric

Threat Level: 2/10
Infected PCs: 60
First Seen: September 19, 2023
OS(es) Affected: Windows

Lebal is spyware that tries to collect information from a variety of sources on your PC, including Web-browsing clients and instant messengers. Cryptocurrency users also are at a particular risk from Lebal, which may try to collect the contents of their wallet accounts. Update your anti-malware solutions for deleting Lebal as soon as possible, and monitor e-mail-based infection exploits for attacks from its campaign.

The Spyware Problem Gets a Little More Intricate

January is the launching point for a campaign by threat actors who have an investment in collecting data that could be either lucrative financially or, possibly, valuable for corporate or state-sponsored espionage. Circumstantial evidence traces these attacks from Brazil, although their targets are variable, including a handful of government departments and higher-education institutions, as well as nearly two-dozen private companies. The weapon they're deploying is Lebal, a new spyware program.

Lebal utilizes slightly more than the usual level of obfuscation for delivering itself to other PCs. Although, as usually is the case, customized e-mail spam is the first step of the infection, the real package for installing this threat hides inside of a corrupted PDF document that the message links to, supposedly as a hyperlink for Google Drive. The original letter themes itself as being a package delivery notice.

The resources invested into the Lebal's abilities for collecting information aren't insubstantial. The spyware can take information from Web browsers, instant messaging clients, and e-mail accounts. However, malware researchers took extra notice of its FTP 'wallet' features, which could allow third parties to collect Bitcoins and similar cryptocurrencies. Since this attack has no point for purely espionage-related purposes, it's an indication of Lebal's threat actors requiring some level of financial benefit from their attacks.

Cutting Down on the Complexity of Dodging E-mail Spies

The infection vectors Lebal uses are well-crafted but, still, follow a template that most PC users should understand as being a ubiquitous tactic. Never click links or view attachments from e-mail messages that have any doubt as to their origins. The use of a PDF vulnerability playing the role of the 'dropper' also is significant since it shows how cybercrooks can use a 'real' document for harmful and non-obvious attacks.

Any information on a compromised PC is, at least potentially, in the ownership of Lebal's threat actors. As a consequence, all victims should change passwords and related security credentials as necessary. Network-monitoring software may detect Lebal's attempts to upload the data to a C&C server, firewall rules may block this activity outright, and various anti-malware programs may remove Lebal or block its delivery mechanisms.

Over three hundred e-mail messages are identifiable as being carriers for Lebal. Since these attacks tend to come in waves, businesses and government employees should remain alert for other, high-volume attempts to infect their servers for purposes either monetary or informational theft.

Technical Details

Additional Information

The following URL's were detected:
news-pecihe.cc
Loading...