cognitive cybersecurity intelligence

News and Analysis

Latest Chaes Malware Variant Targets Financial and Logistics Customers

Hey folks! Coming to you live from the Bay Area, where the sun is shining and the cyber threats are… kinda stressing me out. Recently, a clever piece of malware called Chae$ 4 made its debut, and boy, this isn’t your everyday virus.

Chae$ 4 is like the Hollywood blockbusters of malware – new, sophisticated, and scary in a compelling way. It’s a fresh variant of the Chaes malware, which has been causing mischief since 2020. All those who remember the original Chaes might want a quick refresh on its history.

We were first introduced to Chaes in 2020, when some eagle-eyed folks over at Cybereason let us know that it was stirring up trouble for e-commerce customers in Latin America. Fast forward to 2022, and our friends at Avast gave us even more details, outlining how Chaes had really stepped up its game. Adapting to countermeasures, the naughty little worm even released a response (in code, who does that?), which was dubbed “Lucifer.”

Chae$ 4 is the latest iteration of this pesky threat. Think of it as Chaes: The Sequel, starring Python, with supporting roles by encryption, stealth, and an impressive variety of ways to make our digital lives harder.

The attack of Chaes mainly focuses on folks using platforms like Mercado Libre, Mercado Pago, WhatsApp Web, Itau Bank, Caixa Bank, and, surprisingly, MetaMask. CMS services like WordPress, Joomla, Drupal, and Magento have also found themselves on the list – nobody’s safe, really.

Now this sequel, Chae$ 4 has brought some notable changes to the plot. It comes with revamped code architecture, extra encryption layers, and more stealth. It has opted for Python as its prime language and swapped Puppeteer for a custom method to oversee and intercept Chromium browsers’ activity. Beyond this, it has increased the number of services it can target for stealing credentials and integrated the use of WebSockets for better communication between its modules and malicious server.

What’s fascinating about Chae$ 4 is how it evolves. It began with a malicious installer pretending to be a Java or Anti-Virus software, hiding in Python libraries, encrypted files, and scripts. As it infiltrates further, it activates a series of linked modules that can steal credentials, upload files, and even interfere with cryptocurrency transfers. It’s like the Swiss Army knife of malware!

Speaking of crypto, the folks behind Chae$ 4 seem pretty interested in it. One of the main giveaways is how Chae$ 4 is equipped to steal Bitcoin and Ethereum and specifically targets MetaMask credentials and files. Remember my friends, your crypto matters to you and also, sadly, to Chae$ 4.

Now, to tackle this beast, detection is only half the battle. If Chae$ 4 were an earthquake, we wouldn’t just want to be aware of it; we’d want to be earthquake-proof. In a similar manner, strategies that can proactively prevent such unknown threats from executing can be a game-changer, or at least a day-saver!

To find out more, you might need to dive deeper into the tech side of it. Understanding the mechanism that enables such cyber threats is crucial – not just for the engineers and the CISOs, but for any digital citizen.

We learned from Chaes, but it’s now time to equip ourselves against Chae$ 4. Remember, knowledge isn’t just power – in the digital world, it’s also protection. So, arm yourself with information, get your cybersecurity game on, and remember to ensure those pesky viruses don’t rain on our Bay Area parade!

by Morgan Phisher

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts

Flow Security Launches GenAI DLP

Flow Security, an Israel-based data security platform, has incorporated a GenAI DLP module to secure data for GenAI services and applications. The move seeks to