{"id":8717,"date":"2024-06-25T15:15:58","date_gmt":"2024-06-25T06:15:58","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=8717"},"modified":"2025-01-20T15:18:43","modified_gmt":"2025-01-20T06:18:43","slug":"darkgate-malware-replaces-autoit-with-autohotkey-in-latest-cyber-attacks","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/darkgate-malware-replaces-autoit-with-autohotkey-in-latest-cyber-attacks\/","title":{"rendered":"DarkGate Malware Replaces AutoIt with AutoHotkey in Latest Cyber Attacks"},"content":{"rendered":"\n<p class=\"has-text-align-left\">Cyber attacks involving the DarkGate malware-as-a-service (MaaS) operation have transitioned from using AutoIt scripts to an AutoHotkey mechanism for the final stages of the attack, highlighting the threat actors&#8217; ongoing efforts to evade detection.These updates were observed in DarkGate version 6, released in March 2024 by its developer, RastaFarEye, who has been offering the program on a subscription basis to up to 30 clients. The malware has been active since at least 2018.DarkGate is a comprehensive remote access trojan (RAT) with command-and-control (C2) and rootkit capabilities, as well as modules for credential theft, keylogging, screen capturing, and remote desktop access.<br>&#8220;DarkGate campaigns adapt quickly, altering various components to avoid detection by security solutions,&#8221; said Ernesto Fern\u00e1ndez Provecho, a cybersecurity researcher at Trellix. &#8220;This is the first instance we&#8217;ve observed DarkGate utilizing AutoHotKey, a relatively rare scripting interpreter.&#8221;<br>It is important to note that McAfee Labs first documented DarkGate\u2019s use of AutoHotKey in late April 2024. The attacks exploited security vulnerabilities like CVE-2023-36025 and CVE-2024-21412 to bypass Microsoft Defender SmartScreen protections via Microsoft Excel or HTML attachments in phishing emails.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber attacks involving the DarkGate malware-as-a-service (MaaS) operation have transitioned from using AutoIt scripts to an AutoHotkey mechanism for the final stages of the attack, highlighting the threat actors&#8217; ongoing efforts to evade detection.These updates were observed in DarkGate version 6, released in March 2024 by its developer, RastaFarEye, who has been offering the program on a subscription basis to<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":8718,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,12,2,1],"tags":[],"class_list":["post-8717","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest_news","category-read_article","category-ce_news","category-uncategorized"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2025\/01\/system-background-compromised-by-hacking-3d-illustration_1419-2809.jpg?fit=1800%2C900&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8717"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=8717"}],"version-history":[{"count":2,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8717\/revisions"}],"predecessor-version":[{"id":8721,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8717\/revisions\/8721"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/8718"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=8717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=8717"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=8717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}