Hacking

VSDC video editing software website hacked again

Users that have downloaded the VSDC multimedia editing software between 2019-02-21 and 2019-03-23, may have been infected with malware.

Users that have downloaded the VSDC multimedia editing software between 2019-02-21 and 2019-03-23, may have been infected with a banking trojan and an information stealer.

VSDC is a popular, free video editing and converting app and its website has over 1.3 million monthly visitors, for this reason, this incident may have potentially exposed a large number of people. The hackers already compromised the official website of VSDC in the past, in previous attacks they hijacked the download links to deliver malware to the victims.

In the latest attack, they embedded a malicious JavaScript code inside the VSDC website that was used to determine the visitor’s geolocation and replace download links for users from the UK, USA, Canada, and Australia

VSDCVSDC

“Doctor Web researchers discovered that the official website of a well-known video editing software, VSDC, was compromised.” reads the blog post published by Dr. Web.

“The hackers hijacked download links on the website causing visitors to download a dangerous banking trojan, Win32.Bolik.2, and the Trojan.PWS.Stealer (KPOT stealer) along with the editing software.”

The Win32.Bolik.2 malware is a modular polymorphic file Trojan that has the ability to perform web injections, traffic intercepts, key-logging and stealing information from different bank-client systems.

At the moment, experts believe at least 565 people who downloaded the software were infected.

Attackers also delivered the KPOT Stealer, a variant of Trojan.PWS.Stealer, starting from March 22. The malware is able to steal information from web browsers, Microsoft accounts, several messenger services, and some other programs.

According to the researchers, 83 users were infected with the information stealer.

Unfortunately this isn’t the first time that the VSDC site has been hacked.

In July 2018, experts from Chinese security firm Qihoo 360 Total Security discovered that attackers hijacked the download links of the VSDC website.

The experts discovered that hackers hijacked download links on the websites in three different periods, the links were pointing to servers they were operating.

Below the details of the three different attacks:

  • June 18 – Hackers substituted download links with hxxp://5.79.100.218/_files/file.php
  • July 2 – Hackers substituted download links with hxxp://drbillbailey.us/tw/file.php
  • July 6 – Hackers substituted download links with hxxp://drbillbailey.us/tw/file.php

At the time, hackers were serving the visitors the AZORult Stealer, X-Key Keylogger and the DarkVNC backdoor.

Users that had downloaded the software in the above between have to scan their system for malware using an up-to-date of the antivirus software.

Users are also recommended to change their passwords for banking websites and other services.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, VSDC)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Leader of Qakbot cybercrime network indicted in U.S. crackdown

The U.S. indicted Russian Rustam Gallyamov for leading the Qakbot botnet, which infected 700K+ devices…

4 hours ago

Operation RapTor led to the arrest of 270 dark web vendors and buyers

Law enforcement operation codenamed 'Operation RapTor' led to the arrest of 270 dark web vendors…

1 day ago

Chinese threat actors exploited Trimble Cityworks flaw to breach U.S. local government networks

A Chinese threat actor, tracked as UAT-6382, exploited a patched Trimble Cityworks flaw to deploy…

1 day ago

U.S. CISA adds a Samsung MagicINFO 9 Server flaw to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Samsung MagicINFO 9 Server vulnerability to its…

2 days ago

New Signal update stops Windows from capturing user chats

Signal implements new screen security on Windows 11, blocking screenshots by default to protect user…

2 days ago

Law enforcement dismantled the infrastructure behind Lumma Stealer MaaS

Microsoft found 394,000 Windows systems talking to Lumma stealer controllers, a victim pool that included…

2 days ago