Heimdal Security Blog

New Malware-as-a-Service Gains Traction Among Cybercriminals

Security experts have discovered BunnyLoader, a malware-as-a-service (MaaS) that is rapidly evolving and gaining popularity on different hacker platforms due to its ability to covertly infiltrate systems and manipulate their data, focusing in particular on system clipboards.

Unveiled on September 4, BunnyLoader has witnessed rapid development, swiftly enhancing its malicious capabilities, which currently include:

Bunny Loader also ensures persistence by creating a new value in the Windows Registry upon execution on a compromised device, all while concealing its activities and registering the victim into its control panel.

Additionally, BunnyLoader can steal data from web browsers, cryptocurrency wallets, VPNs, and messaging apps, compressing all pilfered data into a ZIP archive, which is then transferred to the attacker’s command and control server.

BunnyLoader’s Development

Through numerous updates since its debut, the malware has amplified its functionalities and provided bug resolutions, at times releasing significant versions with major enhancements, such as diverse anti-detection mechanisms and augmented information-theft capabilities.

Here’s a timeline of BunnyLoader’s development, according to Zscaler:

Its cost-effective pricing (estimated at $350), coupled with an aggressive development trajectory, positions BunnyLoader as an appealing option for cybercriminals who want to capitalize on new malware projects before they become more popular and more expensive, explains Bleeping Computer.

Protecting Your Business from Malware Threats

Keeping businesses safe from malware involves several strategic steps:

  1. Firstly, ensure your team is educated about cyber threats and knows how to identify phishing attempts;
  2. Secondly, employ and regularly update antivirus software;
  3. Always back up data and store copies securely offsite to mitigate damage from potential ransomware attacks;
  4. Consistently update and patch software, and use multi-factor authentication to bolster login security;
  5. Safeguard your network with firewalls and restrict user privileges;
  6. Establish a well-defined incident response plan, regularly revisiting and updating it to contend effectively with potential cybersecurity breaches.

If you’re looking for a solution to secure your IT infrastructure against sophisticated cyber threats, Heimdal has you covered across the board, from endpoints and networks to emails and identities and beyond.

The next level of security - powered by the Heimdal Unified Security Platform
Experience the power of the Heimdal cloud-delivered XDR platform and protect your organization from cyber threats.
  • End-to-end consolidated cybersecurity;
  • Complete visibility across your entire IT infrastructure;
  • Faster and more accurate threat detection and response;
  • Efficient one-click automated and assisted actioning
Try it for FREE today 30-day Free Trial. Offer valid only for companies.

If you liked this piece, follow us on LinkedInTwitterFacebook, and YouTube for more cybersecurity news and topics.