Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Malware

Gecko Campaign (Dropper) – Malware

March 1, 2025
Reading Time: 3 mins read
in Malware
Gecko Campaign (Dropper) – Malware

Gecko Campaign

Type of Malware

Dropper

Targeted Countries

Argentina
Peru

Date of Initial Activity

2024

Addittional Names

Gecko Assault

Motivation

Financial Gain
Data Theft

Type of Information Stolen

Financial Data
Login Credentials

Attack Vectors

Web Browsing
Phishing

Targeted Systems

Windows

Overview

In August 2024, SCILabs unveiled a dangerous and sophisticated cyberattack campaign targeting users in Latin America, named Operation Gecko Assault. This operation primarily involves the distribution of malware families, including URSA/Mispadu and Mekotio, which are notorious for their ability to steal banking credentials and sensitive information. The campaign’s primary target appears to be Argentine users, as it leverages phishing emails that impersonate the Administración Federal de Ingresos Públicos (AFIP), Argentina’s national tax agency. By using this trusted institution as a lure, the attackers attempt to deceive individuals into downloading malicious files, placing sensitive data at risk. Through a detailed investigation, SCILabs identified key tactics, techniques, and procedures (TTPs) used by the attackers in their malware distribution methods. While the exact distribution vector remains unclear, analysis points to phishing as the most likely approach, with malicious links and attachments designed to exploit vulnerabilities in compromised websites. The attackers’ use of legitimate domains, such as opticasdavid.com and hotelandino.com, which were likely taken over to distribute the malware, illustrates the growing sophistication of this campaign. As these domains have been identified as legitimate but compromised, the potential for further attacks across Latin America remains a serious concern.

Targets

Individuals Information

How they operate

The attack begins with phishing emails, which are likely distributed under the guise of official communications from Argentina’s Administración Federal de Ingresos Públicos (AFIP). These emails contain links leading to compromised websites, including opticasdavid.com and hotelandino.com, both of which appear to have been legitimate domains hijacked by the attackers. Upon visiting these sites, victims are presented with a CAPTCHA challenge, which serves to evade automated detection by security software. Once the CAPTCHA is solved, the victim is tricked into downloading a ZIP file named Fact_AFIP_659341, which contains several malicious components. The use of a CAPTCHA is a notable tactic designed to bypass automated defenses, ensuring that the malware reaches its target. The ZIP file includes a legitimate executable for GoToMeeting, named Factura_Digital_AFIP.exe, which acts as a trojan horse. This executable leverages a DLL hijacking technique to inject a malicious DLL, thus initiating the second stage of the malware. The DLL, developed in Delphi, takes advantage of known vulnerabilities in the software environment, enabling the malware to execute additional payloads within the victim’s system. By using DLL hijacking, the attackers can inject malicious code into trusted applications, bypassing security checks and escalating the chances of successful malware execution. Following the execution of the trojan, the next phase of the infection occurs. The compromised executable downloads additional artifacts to the victim’s system, specifically two files located in the %APPDATA% directory. These files include an AutoIt V3 executable (BC12AA58.exe) and a malicious AutoIt script. AutoIt, a legitimate scripting language commonly used for automation, is exploited by the attackers to create a backdoor into the victim’s machine. The malicious script runs silently in the background, allowing the attackers to maintain persistence, capture sensitive data, and potentially expand their control over the victim’s system. Throughout the infection chain, the attackers demonstrate a high level of technical sophistication, exploiting known vulnerabilities, leveraging trusted applications, and utilizing social engineering tactics to bypass detection. The malware’s capabilities, including the theft of banking credentials and sensitive personal information, pose significant risks to both individuals and organizations. If successful, this attack could lead to substantial financial losses, data breaches, and reputational damage. The technical complexity of Operation Gecko Assault highlights the growing challenges faced by cybersecurity professionals in defending against evolving cyber threats, particularly in Latin America, where such targeted campaigns are becoming more common. Organizations in the region must remain vigilant, enhancing their defenses to mitigate the risks posed by such advanced threats.  
References
  • Gecko Assault: A new operation observed during August 2024
Tags: AFIPArgentinaCyberattackDroppersGecko AssaultGecko CampaignLatin AmericaMalwareMekotioMispaduPeru
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

CoGUI Targets Consumer and Finance Brands

COLDRIVER Hackers Target Sensitive Data

Cisco Fixes Flaw in IOS Wireless Controller

New OttoKit Flaw Targets WordPress Sites

Mirai Botnet Exploits Vulnerabilities in IoT

Critical Kibana Flaws Allows Code Execution

Subscribe to our newsletter

    Latest Incidents

    Masimo Cyberattack Disrupts Manufacturing

    Cyberattack Targets Tepotzotlán Facebook

    West Lothian Schools Hit by Ransomware

    UK Legal Aid Agency Faces Cyber Incident

    South African Airways Hit by Cyberattack

    Coweta County School System Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial