• Contact Editorial Team
  • Advertise on YNOT
  • Submit PR
Tuesday, March 24, 2026
  • Login
  • Register
YNOT
  • Home
  • Industry News
    • Porn Star & Adult Talent News
    • Adult Business News
    • Adult Novelty News
    • Adult Industry Legal News
    • Tech News for Adult Webmasters
    • Video Game News for Adults
    • EU News
  • PR Wire
  • Podcasts
  • Industry Guides
  • Newsletters
No Result
View All Result
  • Home
  • Industry News
    • Porn Star & Adult Talent News
    • Adult Business News
    • Adult Novelty News
    • Adult Industry Legal News
    • Tech News for Adult Webmasters
    • Video Game News for Adults
    • EU News
  • PR Wire
  • Podcasts
  • Industry Guides
  • Newsletters
No Result
View All Result
YNOT
No Result
View All Result
Home Adult Industry News from YNOT Adult Business News

Malware Repurposes Legit Apps for Cyber-espionage

Marty O'Brien by Marty O'Brien
May 9, 2017
in Adult Business News
491
SHARES
Share on FacebookShare on Twitter

More than 500 government organizations worldwide have been infected with a piece of malware designed to collect sensitive data.More than 500 government organizations worldwide have been infected with a piece of malware designed to collect sensitive data. Until recently, their IT staffs didn’t realize they were the victims of cyber-espionage.

The culprit, Netrepser, differs from the majority of Trojans in that it infiltrates legitimate apps, hiding in plain sight while it steals information from high-level targets. Then, it covers its tracks using common utilities already on many computer networks.

Researchers at Bitdefender Labs accidentally uncovered the bug in May 2016 while examining a custom file-packing algorithm. A year later, they’ve unpacked the code, leading to a particularly chilling analysis: The payload is detected by antimalware systems, but even the most sophisticated label Netrepser a “potentially unwanted application” rather than dangerous. Because antimalware systems do not automatically disable PUAs, if the user ignores the warning, Netrepser recruits the compromised computer into a botnet network.

Typically, “a system administrator seeing an alert from the antivirus [software] about a PUA tool will have little to nothing to worry about,” said Bitdefender Senior E-threat Analyst Bogdan Botezatu.

The malware’s “unusual build could have easily made it pass for a regular threat like many of those that organizations block on a daily basis; however, telemetry information provided by our event correlation service has pointed out that most of its victims are government agencies,” the research team wrote in a blog post. “Paired with advanced spear phishing techniques and the malware’s primary focus to collect intelligence and exfiltrate it systematically, we presume that this attack is part of a high-level cyber-espionage campaign.”

According to the team, the malware undertakes a variety of activities, including keylogging and theft of passwords and cookies. After completing its dirty work, Netrepser employs legitimate, widely used utilities like Sysinternal SDelete to obscure forensic evidence, making tracing the attack to its source impossible.

The Trojan “is built around a legitimate, yet controversial, recovery toolkit provided by Nirsoft,” the researchers noted. “The controversy stems from the fact that the applications provided by Nirsoft are used to recover cached passwords or monitor network traffic via powerful command-line interfaces that can be instructed to run completely covertly. For a long time now, the antimalware industry has flagged the tools provided by Nirsoft as potential threats to security specifically because they are extremely easy to abuse and oversimplify the creation of powerful malware.”

According to the Bitdefender team, the hackers behind the attack delivered Netrepser using weaponized rich-text format (RTF) documents attached to emails. A similar method was used in a rash of advanced persistent threat (APT) attacks against human rights groups in Taiwan and Hong Kong and journalists in East Asia that took place in April 2016.

The delivery email message “purportedly comes from a Donald Spencer, who, according to this LinkedIn profile, is currently the Managing Director of Siguler Guff,” the Bitdefender researchers wrote in a whitepaper analyzing Netrepser. “Siguler Guff is a multi-strategy private equity investment firm which, by their own account, has over $11 billion of assets under management. Their real-estate portfolio spans from Mumbai to Moscow, where Drew Guff actually gave a speech at St. Petersburg International Economic Forum in June ’16.

“The headers reveal that the email originates from an inbox called piskulov@rp.co.ru,” the analysis continued. “Attached to the message is a DOC file containing a Visual Basic macro. If opened, the document would ask the user to enable macros in order to execute the dynamic content which would subsequently drop a JavaScript or JavaScript Encoded file to act as final payload.”

The Bitdefender researchers stopped short of accusations, but they noted evidence suggests the engineers behind the widespread government attacks may be Russian. Some file paths used by the Trojan were written in Cyrillic script, and what appeared to be Russian names embedded in the RTF documents actually translated to words like “installation” and “Ural.” In addition, analysis of the keylogger indicated some stolen information is sent to three email addresses in a Russian domain.

 

Tags: Bitdefendercyber-espionageNetrepserTrojan malware
Share196Tweet123
Marty O'Brien

Marty O'Brien

Raised in the Appalachian Mountains of Kentucky, Marty O'Brien was the first of the O'Brien clan to obtain a college degree. A former sports journalist, O'Brien got a peek at the inner workings of the adult entertainment industry while on an assignment to cover the Los Angeles Lakers. He joined the YNOT editorial team in late 2010 and now specializes in technology , business news and ogling starlets.

Related Posts

New on Adult Site Broker Talk: Tsukuru Fors of Tosai Productions
Adult Business News

New on Adult Site Broker Talk: Tsukuru Fors of Tosai Productions

March 24, 2026
Studio 58's ‘Naughty Gras 2026’ Opens This Week
Adult Business News

Studio 58’s ‘Naughty Gras 2026’ Opens This Week

March 24, 2026
Nalpac Releases 2026 Spring Lingerie Catalog
Adult Novelty News

Nalpac Releases 2026 Spring Lingerie Catalog

March 24, 2026
Legendary Performer Micky Lynn Set to Release Documentary
Porn Star & Adult Talent News

Legendary Performer Micky Lynn Set to Release Documentary

March 23, 2026
Load More

SPONSOR

INDUSTRY EVENTS

Currently Playing

YNOT Summit Model Track: Nerds Dig Sexy Gamers

YNOT Summit Model Track: Nerds Dig Sexy Gamers

01:05:46

YNOT Summit Webmaster Track: Understanding Webcam Business Models

00:51:11

YNOT Summit Model Track: Cam Law 101

01:26:24

SPONSOR

POPULAR NEWS

New on Adult Site Broker Talk: Tsukuru Fors of Tosai Productions

New on Adult Site Broker Talk: Tsukuru Fors of Tosai Productions

March 24, 2026
Studio 58's ‘Naughty Gras 2026’ Opens This Week

Studio 58’s ‘Naughty Gras 2026’ Opens This Week

March 24, 2026
Nalpac Releases 2026 Spring Lingerie Catalog

Nalpac Releases 2026 Spring Lingerie Catalog

March 24, 2026

Sponsor

YNOT YNOT

QUICK LINKS:

  • About YNOT
  • Terms of Use
  • Privacy Policy
  • Editorial Team
  • Advertise on YNOT
  • Sitemap

FRIENDS OF YNOT:

  • Best Adult Cams
  • Live Porn
  • Adult Reviews
  • Adult Email Marketing
  • Discounted Porn
  • vr porn sites
  • European Adult Biz Magazine

FRIENDS OF YNOT:

  • Rabbits Reviews
  • XXX Job Interviews
  • Adult Site Broker
  • Femdom
  • Paid Porn Sites
  • Live Sex
  • Cam girl sites
  • AI Girlfriend
  • live porn Vibra Game

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Adult Business News
  • Adult Industry Legal News
  • Adult Novelty News
  • Porn Star & Adult Talent News
  • Tech News for Adult Webmasters
  • Video Game News for Adults
  • Interviews
  • Opinions
  • YNOT Industry Wire
  • Newsletters

Copyright © 2026 YNOT Group LLC.

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.