Malware, Threat Intelligence

Widespread Desert Dexter attack campaign spreads custom AsyncRAT variant

cyber crime assessment , security awareness , malware detection

Attacks exploiting Facebook and Telegram to spread a custom variant of the AsyncRAT trojan have been deployed by newly emergent threat actor Desert Dexter against the Middle East and North Africa since September, according to The Hacker News.

Nearly 900 victims — most of whom are oil production, information technology, construction and agriculture employees in Libya, Saudi Arabia, Turkey, Egypt, Qatar, Tunisia, and the United Arab Emirates — have already been compromised by the campaign, which commenced with the creation of temporary Facebook accounts used to post ads with malicious links, a report from Positive Technologies showed.

Clicking on the ads triggers the download of a RAR archive with scripts facilitating the removal of different .NET processes, persistence, and system data exfiltration before the delivery of the AsyncRAT malware variant featuring an offline keylogger, as well as extensive cryptocurrency wallet and extension searching and Telegram bot communication capabilities.

"The tools used by Desert Dexter are not particularly sophisticated. However, the combination of Facebook ads with legitimate services and references to the geopolitical situation has led to the infection of numerous devices," said Positive Technologies researchers.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds