Kuik Malvertising Trojan
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
It is distributed via fake Adobe Flash Player updates containing a .NET installer. When opened, this module is executed and downloads Kuik.
Once installed Kuik will add a new IP address as a domain name server in order to redirect users to malicious sites. It will also install a set of Google Chrome Extensions with multiple functions including cryptocurrency mining and credential theft.
Remediation steps
| Type | Step |
|---|---|
|
Organisations should consider disabling user downloads of Chrome extensions or implement whitelists of trusted extensions. Additionally, to prevent and detect a trojan infection ensure that:
d-and-h[.]com/fljlngkbcebmlpdlojnndahifaocnipb.crx\nd-and-h[.]com/123.crx\nd-and-h[.]com/jpfhjoeaokamkacafjdjbjllgkfkakca.crx\nd-and-h[.]com/mmemdlochnielijcfpmgiffgkpehgimj.crx\nkuikdelivery[.]com/emhifpfmcmoghejbfcbnknjjpifkmddc.crx\ntripan[.]me/kdobijehckphahlmkohehaciojbpmdbp.crx |
Last edited: 17 February 2020 12:47 pm