Breaking

SocGholish malware is targeting 250 US news outlets, can deploy ransomware

Cyber criminals are using the compromised infrastructure of an anonymous publisher to deploy the SocGholish malware framework on 250+ US-based newspaper websites.

“The media company in question is a firm that provides both video content and advertising to major news outlets. [It] serves many different companies in different markets across the United States,” said Sherrod DeGrippo, VP of threat research and detection at Proofpoint.

TA569 and their SocGholish malware

The hacking group behind this supply-chain attack as per Proofpoint seems to be TA569 has a malicious code that is injected into the JavaScript file and gets loaded by the news website.

The malicious JS file is used to deploy the SocGholish malware, and will affect those that visit those compromised websites.  The malware will be disguised as fake browser updates in ZIP files and appear as update/alerts.

“Proofpoint Threat Research has observed intermittent injections on a media company that serves many major news outlets. This media company serves content via Javascript to its partners,” tweeted Proofpoint’s Threat Insight team.

Source: Proofpoint

As per Proofpoint report, around 250+ US news websites have been affected by this malware, with some of those new sites being the major news broadcasters. This includes news broadcasters from New York, Washington D.C, Chicago, Boston and more.

“TA569 has previously leveraged media assets to distribute SocGholish malware, and this malware can lead to follow-on infections, including potential ransomware,” said DeGrippo.

SocGholish have always had a successor and Proofpoint is continuously monitoring the TA569 and their activities online, a potential aftermath of SocGholish is expected.

SocGholish malware and its history

Proofpoint has already observed SocGholish campaigns that makes use of fake updates and websites to affect end-users, including ransomware payloads.

The same SocGholish malware has been involved in targeting US private firms via fake software updates and compromised them. After infecting the targeted devices, the SocGholish entity leverages those devices as stepping stones to organization’s critical networks and then deploy WastedLocker ransomware.

Source: Proofpoint

With the right entry of Symantec and their security operations team the SocGholish malware and its attempt to encrypt the network was stopped.

Only recently we saw another malware called ‘Bumblebee’ that is capable of being stealthy and deploying ransomware into the targeted network. All these malware and their maneuvers are only reaching to that one ambition of deploying ransomware into the infected network.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Recent Posts

Top 9 Best Log Management Tools for 2025

Discover the best log management tools for efficient system management and monitoring. Learn about the…

6 months ago

Top 4 Remote Support Tools for 2025- Best Remote Support Solution

Taking remote of devices and managing them will make thing simple for IT admins. In…

6 months ago

Top 5 Best Unified Endpoint Management (UEM) Software for 2025

In 2024, the Unified Endpoint Management Software market will continue to evolve and here are…

6 months ago

Top 5 Threat Intelligence Tools For 2025

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

7 months ago

Top 5 Best Microsoft Intune Alternatives to Consider for 2025

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

8 months ago

Recast Software: Advanced Endpoint Management and Security Tools for IT Teams

Recast Software offers a suite of tools designed to enhance and simplify endpoint management in…

1 year ago