New Evasive Campaign Delivers LegionLoader via Fake CAPTCHA & CloudFlare Turnstile
April 7, 2025, 8:35 a.m.
Description
A new malicious campaign has been discovered targeting users searching for PDF documents online. The attack uses fake CAPTCHAs and CloudFlare Turnstile to deliver LegionLoader malware, which then installs a malicious browser extension. The infection chain involves a drive-by download, execution of a VMware-signed application that sideloads a malicious DLL, and use of process hollowing to inject the LegionLoader payload. The browser extension, disguised as 'Save to Google Drive', is installed on Chrome, Edge, Brave and Opera browsers to steal sensitive user data and monitor Bitcoin activities. The campaign has affected over 140 customers, primarily in North America, Asia and Southern Europe, with technology and financial services sectors being the most targeted.
Tags
Date
- Created: April 5, 2025, 7:55 a.m.
- Published: April 5, 2025, 7:55 a.m.
- Modified: April 7, 2025, 8:35 a.m.
Indicators
- f3c26baa56c44a2e397c7e480404495ab9318c59eea0dc4477368b2bf3dde775
- e0b116be7b6b5a3817b31e86101770f607c589eb84091a993eff70d5e9c38d8e
- 9ce118c39cd86d81a554ae604faea66995eda893ac574979e0163acf47c265b4
- 366f0a96a37b792dd921ada741ff18cd3bf450db4588e84f45fec0b524c83f3f
- 114220c0c1f18fd09f0ccddc1bb06e28e27238e5edabe5b050c60553d7996ed7
Additional Informations
- Technology
- Finance
- United States of America