Fake Adobe Acrobat Reader Installers Spreading Byakugan Malware

Published:

spot_img

The cybersecurity world is abuzz with the emergence of a new multi-functional malware called Byakugan, which is being distributed through fake installers for Adobe Acrobat Reader. The attack begins with a deceptive PDF file in Portuguese that prompts the victim to download the Reader application to view the content. Once the victim clicks on the link, an installer named “Reader_Install_Setup.exe” is activated, initiating the infection sequence.

Byakugan utilizes sophisticated techniques like DLL hijacking and Windows User Access Control (UAC) bypass to load a malicious DLL file, leading to the deployment of the final payload. This malware is equipped to gather system metadata, capture screenshots, log keystrokes, download cryptocurrency miners, and extract data from web browsers. Security researcher Pei Han Liao notes that Byakugan is a node.js-based malware packed into its executable.

The discovery of Byakugan comes in the wake of revelations about a campaign spreading the Rhadamanthys information stealer disguised as a groupware installer and the use of a manipulated version of Notepad++ to distribute the WikiLoader malware. These incidents underscore the growing trend of threat actors incorporating both clean and malicious components in malware to evade detection.

As cybersecurity experts continue to unravel the complexities of Byakugan and other emerging threats, vigilance in safeguarding systems and data against malicious actors becomes paramount. Stay tuned for more updates on this evolving landscape of cyber threats.

spot_img

Related articles

Recent articles

After Mythos: New Playbooks for a Zero-Window Cybersecurity Era

After Mythos: New Playbooks for a Zero-Window Cybersecurity Era The rapid evolution of artificial intelligence (AI) is transforming the cybersecurity landscape, particularly with the introduction...

Notepad++ Issues Urgent 8.9.4 Update to Mitigate CVE-2026-3008 String Injection Vulnerability

Notepad++ Issues Urgent 8.9.4 Update to Mitigate CVE-2026-3008 String Injection Vulnerability A critical vulnerability has been identified in Notepad++, a widely utilized open-source text editor,...

CrowdStrike Launches Project QuiltWorks to Strengthen Defense Against AI-Discovered Vulnerabilities

CrowdStrike Launches Project QuiltWorks to Strengthen Defense Against AI-Discovered Vulnerabilities In a significant move to bolster cybersecurity, CrowdStrike has unveiled Project QuiltWorks, a collaborative initiative...

Inspira Enterprise Strengthens Security Copilot Portfolio with Two New Agents Now Available on Microsoft Security Store

Inspira Enterprise Strengthens Security Copilot Portfolio with Two New Agents Now Available on Microsoft Security Store In a significant advancement in cybersecurity capabilities, Inspira Enterprise...