MasterMana botnet hits users by evading detection with URL shorteners

MasterMana botnet hits users by evading detection with URL shorteners

MasterMana botnet is part of an ongoing malware campaign.


The IT security researchers at Prevailion have discovered an active botnet that has been targeting corporations and unsuspected users across the globe.


Dubbed MasterMana by researchers; the botnet utilizes every available option to target its victims including dropping backdoors and phishing attacks through business email compromise commonly known as BEC – If that’s not enough the botnet looks for cryptocurrency wallets on the targeted device and steal their login credentials to withdraw funds.

According to researchers, the malware campaign works in such a way that in the first stage, attackers send emails to victims attached with malicious files, particularly Word, Excel, PowerPoint, and Publisher. Upon opening the attachment, a .NET dll file is downloaded on the system that loads a fileless backdoor, a new form of malware that manages to hide within a computer system and successfully escapes detection.


See: 10 Powerful But Not Yet Promoted Antivirus for PC, Mac, Android, iPhone


Researchers believe that the fileless malware in the MasterMana botnet attack is either a variant of Azorult or Revenge RAT (remote access trojan). It is worth noting that Azorult has been previously used in several sophisticated cyberattacks including PayPal malware scam and attack in which more than 1000 Magento websites were hacked and used for cryptojacking and credential stealing.


Additionally, Azorult is capable of ta ..

Support the originator by clicking the read the rest link below.