‘One Battle After One other’ torrents conceal ultra-sophisticated malware
As everyone knows, winter time is cinema time, and the Oscars are drawing ever nearer. So it’s no surprise that increasingly movies are being launched which can be attracting the eye of the plenty. September noticed the discharge of One Battle After One other, a fast-paced drama starring Leonardo DiCaprio, which is already being touted as an Oscar favourite.
Nevertheless, with a working time of just below three hours, it appears that evidently not everybody needs to go to the films, preferring as an alternative to look at it from house. And they’re additionally resorting to unlawful means. Criminals at the moment are exploiting this, as safety specialists from Bitdefender warn.
Torrents of One Battle After One other are at the moment in circulation, spreading a harmful Trojan referred to as “Agent Tesla.” This Trojan can’t solely steal entry knowledge, but additionally monitor PCs, take them over fully and even management them remotely.
The marketing campaign seems to be large-scale and has subsequently aroused the curiosity of researchers. Of their report, additionally they describe the bizarre technique utilized by the malware to entry affected methods.
That is how the an infection works
After downloading the file that’s purported to include the movie, the person is proven a folder containing varied seemingly innocent information akin to CD.lnk or Part2.subtitles.srt. If the primary file is executed within the hope that it will begin the movie, a Powershell script begins within the background as an alternative.
This accesses the second file, which really incorporates subtitles within the type of a textual content file, but additionally code snippets. The script jumps to the purpose the place the hidden code is contained after which executes it.
One other file referred to as One Battle After One other.m2ts, which is disguised as a video file, can be used to proceed the an infection chain. The identical occurs with different seemingly innocent information that collectively include malicious code. The tip outcome: the Trojan is put in on the system and the attackers can strike instantly.
Undetectable even by virus scanners
The process appears difficult, however serves one foremost objective: neither Home windows nor frequent virus safety packages can reliably detect that that is malicious software program. Because the attackers use seemingly innocent file sorts and present instruments akin to Powershell, the person processes seem like fully regular accesses.
Solely on the very finish may the person notice that it’s a Trojan. However by then it’s already too late and the hackers can merely block all makes an attempt to guard the gadget. Even a system restart not blocks the attackers.
The safety specialists don’t specify precisely what number of methods have already been hit by the wave of assaults. Nevertheless, there may be discuss of hundreds of downloads. As well as, attackers have already been profitable with related techniques previously. For instance, with pretend downloads of the Marvel movie Shang Chi and the Legend of the Ten Rings or the blockbuster Mission Unattainable: The Last Reckoning, which curiously warns of the hazards of recent expertise.
In any case, you must chorus from acquiring movies or collection from unlawful websites, as in any other case you may catch a malware-infected file at any time (and probably make your self liable to prosecution). As a substitute, await the movies you have an interest in to land on authorized streaming companies — or go to the films whereas they’re nonetheless in theaters.
This text initially appeared on our sister publication PC-WELT and was translated and localized from German.

