Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/Threats/Hackers Deploy BRUSHWORM and BRUSHLOGGER Against South Asian
Threats

Hackers Deploy BRUSHWORM and BRUSHLOGGER Against South Asian

A South Asian financial institution is the latest victim in a focused cyberattack. This operation leveraged two custom-built malware tools: BRUSHWORM, a modular backdoor, and BRUSHLOGGER, a keylogger...

Marcus Rodriguez
Marcus Rodriguez
March 27, 2026 3 Min Read
0 0

A South Asian financial institution is the latest victim in a focused cyberattack. This operation leveraged two custom-built malware tools: BRUSHWORM, a modular backdoor, and BRUSHLOGGER, a keylogger disguised as a trusted system file.

The attack combined file theft, persistent system access, and real-time keystroke capture, underlining the growing risk that financial organizations across South Asia face from targeted intrusions.

The two malware components were delivered as separate binaries in what appears to be a deliberate operation.

BRUSHWORM, disguised as paint.exe, acted as the primary implant — responsible for establishing persistence, communicating with a remote command-and-control (C2) server, downloading additional payloads, spreading through removable USB drives, and stealing sensitive documents from infected systems.

BRUSHLOGGER, meanwhile, masqueraded as libcurl.dll, a commonly trusted Windows library, through a technique called DLL side-loading.

Its sole function was to silently record every keystroke typed on the compromised machine while also logging the active window title for each session.

Elastic Security Labs researchers identified the malware during an investigation into the targeted financial institution’s infrastructure.

The victim environment had only SIEM-level visibility at the time, which significantly restricted post-exploitation telemetry and made thorough forensic reconstruction difficult.

Through VirusTotal pivoting, researchers also uncovered what appear to be earlier development versions of the backdoor, uploaded under filenames such as V1.exe, V2.exe, and V4.exe, indicating the threat actor was actively improving the toolset before deployment.

Despite the targeted nature of the attack, neither binary relied on meaningful code obfuscation, packing, or advanced protective techniques. The overall code quality was notably weak.

For instance, BRUSHWORM writes its decrypted configuration to disk in cleartext before creating an encrypted copy and then deleting the original — an error-prone sequence that reveals poor development discipline.

Combined with the use of free dynamic DNS infrastructure in testing versions and the absence of a kill switch, researchers assessed with moderate confidence that the malware author is relatively inexperienced and may have used AI code-generation tools during development without fully reviewing the output.

The impact of this attack extended well beyond simple data theft. BRUSHWORM was built to replicate itself across connected USB drives using socially engineered filenames like Salary Slips.exe, Documents.exe, and Dont Delete.exe — names crafted specifically to trick employees in a corporate financial setting into opening them.

BRUSHLOGGER quietly captured every keystroke in parallel, harvesting login credentials, financial inputs, and internal communications throughout the infection period.

BRUSHWORM’s Infection Mechanism and Persistence

One of the most operationally notable aspects of this attack is how BRUSHWORM quietly digs into a system and ensures it stays there.

Upon first execution, the malware creates several hidden directories with hardcoded paths — including C:ProgramDataPhotoesPics for the main backdoor binary and C:UsersPublicLibraries for downloaded modules.

Interestingly, the misspelling of “Photoes” instead of “Photos” appears consistently across both components and is believed to be an authentic mistake by the author, possibly to blend with legitimate user media directories. 

Installation Directory (Source - Elastic)
Installation Directory (Source – Elastic)

To survive system reboots, BRUSHWORM registers a Windows scheduled task named MSGraphics through the COM Task Scheduler interface, configured to run the backdoor each time a user logs in.

It then fetches a DLL payload from its C2 server at resources.dawnnewsisl[.]com/updtdll using a WinHTTP GET request, saves it as Recorder.dll, and launches it through a second scheduled task named MSRecorder via rundll32.exe. 

Scheduled Task (Source - Elastic)
Scheduled Task (Source – Elastic)

In environments without active internet access, BRUSHWORM pivots to a physical exfiltration method, copying all stolen files directly to any connected USB drive to bridge air-gapped networks.

Security teams are advised to restrict the execution of unsigned binaries and closely monitor for unusual scheduled task creation, especially tasks named MSGraphics or MSRecorder.

Deploying endpoint detection solutions with USB activity monitoring can block BRUSHWORM’s removable media propagation before it spreads further.

Auditing DLL loading behavior across endpoints is also essential to catch side-loading attempts like those used by BRUSHLOGGER. YARA rules are available to identify both BRUSHWORM and BRUSHLOGGER across endpoints and network environments.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitHackerMalwareSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Phishing ZIP Files Deploy PXA Stealer Hackers Against

Next Post

Silver Fox Phishing Targets Japanese Businesses with Tax Lures

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us