Symantec reported a significant increase in activity from the Neshuta malware family over the past month. Originally identified in 2005, Neshuta functions as a file infector that embeds malicious code into executable files and collects system information from affected devices. This malware’s persistence capability allows it to remain on compromised endpoints, making it challenging to eradicate. Its primary infection method includes appending its code to various system files, a tactic that has kept it in use for nearly two decades.
In recent years, Neshuta’s functionality has expanded beyond basic file infection. Attackers are now using it as a payload dropper, deploying additional malware onto compromised systems. This development has made Neshuta a versatile tool in delivering various threats, including ransomware. As a result, the malware has become a gateway to more severe infections, allowing attackers to load additional threats onto systems it has infected.
One of the recent malware types spread by Neshuta includes the Hardbit ransomware. Hardbit is particularly damaging as it encrypts data on infected devices, demanding a ransom for its release. By delivering Hardbit and similar threats, Neshuta has become more than just an infection vector; it plays a direct role in executing harmful ransomware attacks.
Symantec’s observations highlight the enduring adaptability of older malware families like Neshuta, which has shifted from a standalone infector to a tool for delivering high-impact threats. This trend underscores the need for updated and layered cybersecurity measures, as attackers continue to evolve long-standing malware to launch sophisticated, multi-stage attacks on vulnerable systems. Symantec advises heightened awareness and monitoring for any signs of Neshuta-related infections to prevent broader damage from secondary payloads.
Reference: