Saturday, June 28, 2025

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network 

Home » Security Bloggers Network » Fickle Malware Leads to UAC Bypass and Data Exfiltration

SBN

Fickle Malware Leads to UAC Bypass and Data Exfiltration

by Wajahat Raja on July 5, 2024

A new Rust-based malware called Fickle Stealer has emerged, targeting sensitive information through multiple attack vectors. Fortinet FortiGuard Labs reports that Fickle malware is distributed via four main methods: VBA dropper, VBA downloader, link downloader, and executable downloader. Some of these methods utilize a PowerShell script to bypass User Account Control (UAC) and deploy the malware.

PowerShell Script Exploitation

The PowerShell script, identified as “bypass.ps1” or “u.ps1,” not only bypasses UAC but also collects and transmits victim information. The script sends data such as the victim’s country, city, IP address, operating system version, computer name, and username to a Telegram bot controlled by the attacker. This method ensures the attacker remains updated on the status and location of the compromised systems.

Fickle Malware – Stealthy Execution and Data Exfiltration

As per recent reports, the Fickle malware employs a packer to protect its payload, running several anti-analysis checks to avoid detection in sandbox or virtual machine environments. Once these checks are passed, the malware communicates with a remote server, sending the harvested data as JSON strings. The malware targets information from various sources, including crypto wallets, web browsers like Google Chrome, Microsoft Edge, Brave, Vivaldi, and Mozilla Firefox, and applications such as AnyDesk, Discord, FileZilla, Signal, Skype, Steam, and Telegram.

Techstrong Gang Youtube
AWS Hub

Rust Malware Analysis

Security researcher Pei Han Liao notes that Fickle Stealer not only targets popular applications but also searches for sensitive files in directories commonly used for software installations. The malware can export files with extensions such as .txt, .kdbx, .pdf, .doc, .docx, .xls, .xlsx, .ppt, .pptx, .odt, .odp, and wallet.dat. This extensive data gathering ensures that a wide range of valuable information is exfiltrated.

Advanced Attack Techniques

Fickle Stealer’s deployment methods are sophisticated. Attackers download a PowerShell script to set up the malware, sometimes using an additional file to facilitate the download. The primary goal of the script is to bypass UAC and execute the malware. The script also schedules a task to run another script, engine.ps1, after a delay, which uses both legitimate and fake WmiMgmt.msc files to maintain stealth. This technique, known as Mock Trusted Directories, allows the malware to execute with elevated privileges without triggering a UAC prompt.

Constant Communication and Updates

The PowerShell scripts, including u.ps1, engine.ps1, and inject.ps1, frequently send status updates to the attacker via a Telegram bot. These scripts download and execute tgmes.ps1 with each message, which is stored temporarily and deleted after execution. The information stealing malware continuously sends victim details to the attacker, ensuring they remain informed and can update the attack as needed.

Similar Threats

The discovery of the Fickle malware comes alongside revelations about AZStealer, an open-source Python-based information stealer. Available on GitHub, AZStealer has been advertised as a highly effective Discord stealer. It infiltrates stolen information by zipping it and sending it through Discord webhooks or uploading it to Gofile before transmission.

Conclusion

The rust malware exemplifies the growing sophistication of malware, utilizing multiple attack vectors and advanced techniques to harvest sensitive information while evading detection. The continuous updates and flexible target lists make it a persistent threat, emphasizing the need for robust cybersecurity measures and vigilant monitoring to protect against such complex threats.

The sources for this piece include articles in The Hacker News and Security Affairs.

The post Fickle Malware Leads to UAC Bypass and Data Exfiltration appeared first on TuxCare.

*** This is a Security Bloggers Network syndicated blog from TuxCare authored by Wajahat Raja. Read the original post at: https://tuxcare.com/blog/fickle-malware-leads-to-uac-bypass-and-data-exfiltration/

July 5, 2024July 5, 2024 Wajahat Raja Bypass User Account Control (UAC), Cybersecurity News, information stealer, Information stealing malware, rust malware, rust malware analysis, Rust-based malware
  • ← Understanding API Key Verification
  • Extending the Reach and Capabilities of Digital Signing With Standards →

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

Upcoming Webinars

Securing Vibe Coding: Addressing the Security Challenges of AI-Generated Code
How to Spot and Stop Security Risks From Unmanaged AI Tools

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

N. Korean Group BlueNoroff Uses Deepfake Zoom Calls in Crypto Scams
WhatsApp BANNED by House Security Goons — But Why?
DataKrypto and Tumeryk Join Forces to Deliver World’s First Secure Encrypted Guardrails for AI LLMs and SLMs
LapDogs Campaign Shows Chinese Groups’ Growing Use of ORB Networks
Using AI to Identify Patterns in Vishing Attempts
Black Hat SEO Poisoning Search Engine Results For AI to Distribute Malware
Application and API Security Can’t Rely Solely on Perimeter Defenses or Scanners | Notes on Gartner AppSec Research | Contrast Security
What Water Utilities Need to Know About HMI Security and AI Solutions
The Security Fallout of Cyberattacks on Government Agencies
Role of AI in Vulnerability Management

Industry Spotlight

WhatsApp BANNED by House Security Goons — But Why?
Application Security Cloud Security Cyberlaw Cybersecurity Data Privacy Data Security DevOps Endpoint Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches Vulnerabilities 

WhatsApp BANNED by House Security Goons — But Why?

June 24, 2025 Richi Jennings | 4 days ago 0
Scattered Spider Targets Aflac, Other Insurance Companies
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Industry Spotlight Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence 

Scattered Spider Targets Aflac, Other Insurance Companies

June 22, 2025 Jeffrey Burt | Jun 22 0
US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency
Analytics & Intelligence Blockchain Cyberlaw Cybersecurity Data Privacy Digital Currency Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence Threats & Breaches 

US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency

June 20, 2025 Richi Jennings | Jun 20 0

Top Stories

‘IntelBroker’ Hacker Arrested for Wave of High-Profile Data Breaches
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Mobile Security Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

‘IntelBroker’ Hacker Arrested for Wave of High-Profile Data Breaches

June 28, 2025 Jeffrey Burt | Yesterday 0
Abstract Security Adds Data Lake to Reduce Storage Costs
Cybersecurity Featured News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

Abstract Security Adds Data Lake to Reduce Storage Costs

June 27, 2025 Michael Vizard | 1 day ago 0
N. Korean Group BlueNoroff Uses Deepfake Zoom Calls in Crypto Scams
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Malware Mobile Security Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence 

N. Korean Group BlueNoroff Uses Deepfake Zoom Calls in Crypto Scams

June 26, 2025 Jeffrey Burt | 2 days ago 0

Security Humor

Randall Munroe’s XKCD ‘Interoperability’

Randall Munroe’s XKCD ‘Interoperability’

Download Free eBook

7 Must-Read eBooks for Security Professionals

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2025 Techstrong Group Inc. All rights reserved.
×