
In an interesting revelation this week, financial institutions across the Asia-Pacific (APAC) and Middle East and North Africa (MENA) regions have taken proactive measures to counter a fresh wave of cyber threats orchestrated by the notorious JSOutProx malware. Termed as an “evolving threat,” this sophisticated attack framework combines the power of JavaScript and .NET, showcasing a new level of complexity in cyber warfare.
Detailed comprehensive technical report by Resecurity, the modus operandi of JSOutProx unveils a complex network of operations. Leveraging .NET serialization, the malware seamlessly interacts with a core JavaScript module on targeted systems. Once activated, the framework deploys various plugins, each designed to execute malicious activities with precision.
Originally discovered by Yoroi in December 2019, JSOutProx has since evolved, with early attacks attributed to the infamous threat actor, Solar Spider. Notorious for its onslaught against major banks and corporations in Asia and Europe, Solar Spider has left a trail of cyber havoc in its wake.
Recent developments have seen JSOutProx morphing into a more insidious tool, as evidenced by attacks highlighted by Quick Heal Security Labs. Targeting employees of small finance banks in India, these assaults underscore the malware’s adaptability and ruthlessness. Moreover, government entities in India have also fallen victim to JSOutProx, dating back to April 2020, indicative of its widespread impact.
The modus operandi of these attacks is insidious, often employing spear-phishing emails laden with malicious JavaScript attachments disguised as innocuous PDFs or ZIP archives. These attachments harbor rogue HTA files, which serve as conduits for deploying the heavily obfuscated implant, further complicating detection.
What sets JSOutProx apart is its multifaceted nature, boasting an array of plugins tailored for data exfiltration, file system operations, and offensive maneuvers. Notably, the malware can manipulate proxy settings, intercept clipboard content, and even extract one-time passwords, demonstrating its versatility and potency.
Furthermore, JSOutProx’s utilization of the Cookie header field for command-and-control communications adds another layer of sophistication, confounding traditional detection mechanisms.
Despite its formidable capabilities, JSOutProx’s true menace lies in its implementation as a fully functional Remote Access Trojan (RAT) in JavaScript. While JavaScript may appear innocuous to the untrained eye, its ubiquity on websites and obfuscation capabilities render it a potent weapon in the hands of cybercriminals.

The latest onslaught of JSOutProx attacks, as documented by Resecurity, has seen cyber adversaries resorting to deceptive tactics, including fake SWIFT or MoneyGram payment notifications. These ploys have witnessed a surge in activity since February 8, 2024, signaling a heightened sense of urgency among perpetrators.
In response, cybersecurity experts have intensified efforts to combat this menace. Hosting artifacts on GitHub and GitLab repositories, the attackers attempt to evade detection, only to be thwarted by swift action from cybersecurity firms.
While the origins of the e-crime group behind JSOutProx remain shrouded in mystery, suspicions point to affiliations with China, given the victimology distribution and the malware’s sophistication.
However, the battle against cyber threats extends beyond JSOutProx alone. The emergence of tools like GEOBOX, which repurpose Raspberry Pi devices for fraudulent activities, underscores the evolving landscape of cybercrime. Priced at a mere $80 per month, GEOBOX enables perpetrators to engage in a myriad of illicit activities, from financial fraud to corporate espionage.
The ease of access to such tools poses a grave threat to cybersecurity, raising concerns about their widespread adoption among various threat actors.
In the face of these challenges, financial institutions in APAC and MENA have demonstrated resilience, fortifying their defenses and collaborating with cybersecurity experts to mitigate risks. As the battle against cyber threats rages on, vigilance and innovation remain our most potent weapons in safeguarding the integrity of our digital infrastructure.
Interesting Article : Google Alert: Zero Day Vulnerabilities in Pixel Phones (CVE-2024-29745 & CVE-2024-29748)
Pingback: AI-as-a-Service Vulnerable to Cyber Attacks in 2024