No recent events yet!
Risk: | high |
Damage: |
high |
Platform(s): |
Microsoft® Windows OS |
Advisory ID: |
ngCERT-2025-010002 |
Version: |
N/A |
CVE: |
N/A |
Published: |
January 16, 2025 |
ngCERT is aware of an ongoing distribution of a new malware strain dubbed Playfulghost. The malware has been identified as a backdoor that enable attackers to remotely execute a range of activities once a device is infected. Some of the malware capabilities include keylogging, screen capture, audio capture, remote shell, and file transfer/execution features. According to Google's Managed Defense team, the attackers are leveraging popular VPN applications as a delivery mechanism, embedding the malware payload within legitimate applications, and distributing it through Search Engine Optimization (SEO) poisoning and phishing campaigns. The malware poses significant risks, including system takeover, data theft, financial losses, and potential ransomware attacks. ngCERT strongly advises individuals and organizations to take immediate steps to secure their systems and data from this emerging threat.
In the SEO poisoning distribution method, attackers manipulate search engine results to promote trojanized software, making it appear as a legitimate download to distribute the malware components via trojanized Virtual Private Network (VPN) applications, thereby downloading Playfulghost onto victims' devices from remote servers. Similarly, in the Phishing attacks, the victims are lured through deceptive emails into clicking malicious links or opening infected files which then execute Playfulghost from a remote server. In the initial phase of the attack chain, victims may download a malicious RAR archive or an executable disguised as a legitimate software installer. When executed, the archive drops a malicious Windows executable that downloads and activates Playfulghost from a remote server. The malware then establishes persistence on the host system using techniques such as run registry keys, scheduled tasks, Windows Startup folder entries, and Windows services. With its extensive capabilities, Playfulghost can collect a wide range of sensitive information, including keystrokes, screenshots, audio recordings, installed security products, clipboard content, and system metadata. The malware also performs additional malicious activities, such as dropping more payloads, disabling mouse and keyboard input, clearing Windows event logs, and wiping clipboard data. Furthermore, it carries out file operations and deletes browser caches, profiles, and local storage for web browsers like 360 Safety, Firefox, and Google Chrome. Messaging applications such as Skype and Telegram are also targeted, with the malware erasing profiles and local storage data. These advanced features make Playfulghost a significant threat, capable of compromising system security, stealing data, and enabling further malicious operations.
If successfully executed, Playfulghost malware can result in:
ngCERT recommends the following: