Cybersecurity researchers have identified a new malware loader called SquidLoader that targets Chinese organizations via phishing campaigns. First detected by AT&T LevelBlue Labs in late April 2024, SquidLoader incorporates advanced evasion techniques to thwart both static and dynamic analysis, making it difficult to detect. The malware is distributed through phishing emails containing attachments that appear to be Microsoft Word documents but are actually binaries that execute the malware and fetch second-stage payloads from remote servers.
SquidLoader uses a variety of defensive evasion methods, including encrypted code segments, Control Flow Graph (CFG) obfuscation, and debugger detection. It also performs direct system calls instead of using Windows NT APIs to avoid detection. These sophisticated techniques enable the malware to remain undetected while hindering analysis, making it a popular tool in the criminal underground for delivering additional payloads to compromised hosts.
Loader malware like SquidLoader is increasingly used by threat actors to bypass antivirus defenses and other security measures. The cybersecurity landscape has seen similar malware such as Taurus Loader, which distributes information stealers and trojans, and PikaBot, which employs advanced anti-analysis techniques and continues to be actively developed. These loaders facilitate the execution of more malware, set up persistence using Windows Registry changes, and gather data.
In addition to SquidLoader, recent efforts by law enforcement have led to the takedown of infrastructure related to several other loader malware, including Latrodectus, as part of Operation Endgame. This operation dismantled over 100 botnet servers associated with various malware strains, significantly impacting cybercriminal activities. The ongoing development and sophistication of malware loaders highlight the need for robust cybersecurity measures to protect against these evolving threats.
Reference: