Newly discovered powerful InvisiMole Spyware attack targeted computer to turn on the video camera and record the videos, audio to hear whatever things happening to surround the victims and take the Picture.
Also, it has the ability to steal the various sensitive information of the victim’s computer by closely monitoring the victims actvities.
InvisiMole is one of the powerful spyware and it actively attacking many victims around the world since 2013 and now it discovered in Ukraine and Russia based targeted users computer.
It Contains 2 malicious component and both have rich backdoors actvities and it performs to steal and gather information as much as they can from the targeted machine.
Especially it is capable of remotely activating the microphone on the compromised computer and capturing sounds and audio recordings that will be misused by various purposes.
How Does InvisiMole Spyware Works
It has both 32-bit and 64-bit versions of the malware and both variant using persistence technique to working with both architectures.
Apart from the DLL Hijacking it using another entry point by exporting the function called GetDataLength which help to launch the payload.
Malware authors cleverly set to zero values PE timestamps manually so the exact time of the compilation is unknown.
Attackers encrypting the strings, internal files, configuration data and network communication to make it more stealthy and maintain the Persistence.
Later the module communicate with its C&C server even if there is a proxy configured on the infected computer and it also has an ability to communicate with C2 server using locally-configured proxies if the connection is unsuccessful.
Commands will perform to collect some basic system information and it added the spyware future into the system.
The attack could remotely turn on the system microphone on the compromised computer and capturing sounds.
Also, InvisiMole Spyware can interfere with the victim’s privacy is by taking screenshots using another backdoor commands.
“The malware also monitors all fixed and removable drives mapped on the local system. Whenever a new drive is inserted, it creates a list of all the files on the drive and stores it encrypted in a file.”
All of the collected data can ultimately be sent to the attackers when the appropriate command is issued. ESET said.