{"id":17744,"date":"2020-02-14T14:40:06","date_gmt":"2020-02-14T22:40:06","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2020\/02\/14\/news-11477\/"},"modified":"2020-02-14T14:40:06","modified_gmt":"2020-02-14T22:40:06","slug":"news-11477","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/02\/14\/news-11477\/","title":{"rendered":"ViperSoftX &#8211; New JavaScript Threat"},"content":{"rendered":"<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12\">\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\"><\/div>\n<\/p><\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p><a href=\"https:\/\/fortiguard.com\/\">FortiGuard Labs<\/a>\u00a0Threat Analysis<\/p>\n<p>Affected Platforms:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Windows<br \/> Impacted Users: \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Any Windows users<br \/> Threat Severity: \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 High \u2013 allows the attacker to gain remote access.<\/p>\n<p>Recently, FortiGuard Labs, leveraging the FortiEDR endpoint protection platform, detected and blocked a new and highly obfuscated malicious malware in a large OT environment. This newly discovered JavaScript-based Remote Access Trojan (RAT) and cryptocurrency stealer, which we have dubbed \u201cViperSoftX\u201d (due to a hardcoded string used by its creator), became notably active towards the end of 2019, and remains so as of the time of this writing. In this blog post we will analyze the tactics, techniques, and procedures (TTPs) used by this new discovered threat along with details on the campaign we uncovered that uses this new malware. <\/p>\n<h2>Obfuscation<\/h2>\n<p>ViperSoftX unravels\u00a0<b>8 layers<\/b>\u00a0of code obfuscation before executing its actual payload. There are 3 different types of obfuscation techniques being employed:<\/p>\n<ol>\n<li><u>AES Decryption:<\/u>\u00a0This is only used in the first layer. The author copy-pasted chunks of code that implements the AES algorithm from the widely used\u00a0<a href=\"https:\/\/www.npmjs.com\/package\/crypto-js\">CryptoJS<\/a>\u00a0library. Every sample has a different hardcoded AES key.<\/li>\n<li><u>Converting Char Arrays:<\/u>\u00a0This method executes only once as well, usually at the third layer, and has the simple functionality of evaluating a hardcoded array of characters.<\/li>\n<li><u>UTF8 Decoding:<\/u><span>\u00a0This method is the most recurring deobfuscation layer. It contains code snippets most likely copied from the online\u00a0<\/span><a href=\"http:\/\/www.webtoolkit.info\/javascript_base64.html\">Web Toolkit<\/a><span>\u00a0to perform UTF-8 decoding.\u00a0<\/span><\/li>\n<\/ol>\n<p>Another effective method used to thwart the analysis of this malware is appending a non-ascii character at the end of the script, which results in encoding exceptions in most of the existing debuggers and basic deobfuscation methods.<\/p>\n<h2>Persistency<\/h2>\n<p>ViperSoftX starts by placing a copy of itself under\u00a0<i>%APPDATA%<\/i>. The author attempts to disguise the malicious script by using seemingly legitimate names such as v<i>pn_port.dll, reg.converter.sys, install.sig,\u00a0<\/i>and<i>\u00a0install.db<\/i>.<\/p>\n<p>To establish persistency, the malware drops another script file under\u00a0<i>%APPDATA%<\/i>\u00a0and creates a shortcut in the startup directory to invoke it. The dropped script is a VBScript file, which in turn, executes ViperSoftX:<\/p>\n<\/p><\/div>\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\">\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0.0001pt; line-height: 16.866666793823242px; font-size: 11pt; font-family: Arial, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start;\"><span style=\"font-size: 10pt; line-height: 15.333332061767578px; font-family: 'Courier New';\">Set WshShell = WScript.CreateObject(&ldquo;&rdquo;&rdquo;WScript.Shell&rdquo;&rdquo;&rdquo;)<\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0.0001pt; line-height: 16.866666793823242px; font-size: 11pt; font-family: Arial, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start;\"><span style=\"font-size: 10pt; line-height: 15.333332061767578px; font-family: 'Courier New';\">Obj = WshShell.Run(&ldquo;&rdquo;&rdquo;wscript.exe \/E:jscript &ldquo;&rdquo;&rdquo;[PATH TO THE JS FILE]&rdquo;&rdquo;&rdquo;<\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 10pt; line-height: 16.866666793823242px; font-size: 11pt; font-family: Arial, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start;\"><span style=\"font-size: 10pt; line-height: 15.333332061767578px; font-family: 'Courier New';\">Set WshShell = Nothing<\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 10pt; line-height: 16.866666793823242px; font-size: 11pt; font-family: Arial, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: center;\" align=\"center\"><strong><em><span style=\"font-size: 9pt; line-height: 13.800000190734863px;\">Figure 1: Dropped VBScript<\/span><\/em><\/strong><\/p>\n<\/div><\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<h2>RAT Functionality<\/h2>\n<p>After establishing persistency, ViperSoftX queries the C&amp;C server to fetch a command for execution. It does so in an infinite loop, and following each command execution it sleeps for 3 seconds.<\/p>\n<p>The requests are sent in plain-text via HTTP PUT request to\u00a0<b>hxxp:\/\/seko[.]vipers[.]pw:8880\/connect.<\/b><\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn aem-GridColumn--default--12\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/vipersoftx-new-javascript-threat\/_jcr_content\/root\/responsivegrid\/image.img.png\/1581661050686\/picture1.png\" alt=\"Figure 2: Typical HTTP Request\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 2: Typical HTTP Request<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>ViperSoftX uses HTTP headers to pass the machine information to the C&amp;C server. The\u00a0<i>X-Header<\/i>\u00a0field (a non-standard header) is set to the hardcoded version and the\u00a0<i>User-Agent<\/i>\u00a0header is set to the machine information that includes:<\/p>\n<\/p><\/div>\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\">\n<ul style=\"margin-top: 0px; margin-bottom: 13.333333015441895px;\">\n<li style=\"margin: 0in 0in 0.0001pt 0px; line-height: 115%; font-size: 11pt; font-family: Arial, sans-serif;\">The hardcoded version + &ldquo;_&rdquo; + includes the serial number of the machine, which is obtained using WMI&rsquo;s&nbsp;<span style=\"font-family: 'Courier New';\">win32_logicaldisk<\/span>&nbsp;class and then extracting the&nbsp;<span style=\"font-family: 'Courier New';\">VolumeSerialNumber.<\/span><\/li>\n<li style=\"margin: 0in 0in 0.0001pt 0px; line-height: 115%; font-size: 11pt; font-family: Arial, sans-serif;\">The&nbsp;<em><span style=\"font-family: 'Courier New';\">ComputerName&nbsp;<\/span><\/em>&ndash; an environment variable.<\/li>\n<li style=\"margin: 0in 0in 0.0001pt 0px; line-height: 115%; font-size: 11pt; font-family: Arial, sans-serif;\">The&nbsp;<em><span style=\"font-family: 'Courier New';\">UserName<\/span><\/em><span style=\"font-family: 'Courier New';\">&nbsp;<\/span>&ndash; an environment variable.<\/li>\n<li style=\"margin: 0in 0in 0.0001pt 0px; line-height: 115%; font-size: 11pt; font-family: Arial, sans-serif;\">The operating system version from the&nbsp;<span style=\"font-family: 'Courier New';\">Caption<\/span>&nbsp;property of WMI&rsquo;s&nbsp;<span style=\"font-family: 'Courier New';\">win32_operatingsystem<\/span>&nbsp;class.<\/li>\n<li style=\"margin: 0in 0in 0.0001pt 0px; line-height: 115%; font-size: 11pt; font-family: Arial, sans-serif;\">The CPU architecture from the&nbsp;<span style=\"font-family: 'Courier New';\">AddressWidth<\/span>&nbsp;property of WMI&rsquo;s&nbsp;<span style=\"font-family: 'Courier New';\">win32_processor<\/span>&nbsp;class instance of &lsquo;cpu0&rsquo;.<\/li>\n<li style=\"margin: 0in 0in 0.0001pt 0px; line-height: 115%; font-size: 11pt; font-family: Arial, sans-serif;\">Installed Anti-Virus information obtained by querying WMI&rsquo;s instances of the&nbsp;<span style=\"font-family: 'Courier New';\">AntiVirusProduct<\/span>&nbsp;class in the&nbsp;<span style=\"font-family: 'Courier New';\">SecurityCenter<\/span>&nbsp;and&nbsp;<span style=\"font-family: 'Courier New';\">SecurityCenter2<\/span>&nbsp;namespaces.<\/li>\n<li style=\"margin: 0in 0in 10pt 0px; line-height: 115%; font-size: 11pt; font-family: Arial, sans-serif;\">A boolean flag indicating whether&nbsp;<em><span style=\"font-family: 'Courier New';\">Microsoft.NET\\Framework\\v2.0.50727\\vbc.exe<\/span><\/em>&nbsp;exists on the machine.<\/li>\n<\/ul>\n<p style=\"margin: 0in 0in 10pt; line-height: 16.866666793823242px; font-size: 11pt; font-family: Arial, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start;\">The hardcoded version string format is as follows:<\/p>\n<p style=\"margin: 0in 0in 10pt; line-height: 16.866666793823242px; font-size: 11pt; font-family: Arial, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start;\"><span style=\"font-family: 'Courier New';\">Vress = &ldquo;viperSoftx_x.x.x.x&rdquo;<\/span><\/p>\n<p style=\"margin: 0in 0in 10pt; line-height: 16.866666793823242px; font-size: 11pt; font-family: Arial, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start;\">There are no differences between files with different versions. Since the version is being sent to the server, we assume it might act as tag for different operations or campaigns being carried out.&nbsp;<\/p>\n<p style=\"margin: 0in 0in 10pt; line-height: 16.866666793823242px; font-size: 11pt; font-family: Arial, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start;\">The response received from the server is a string that is split into an array, which represents the command to be executed. Currently, the following commands implemented by ViperSoftX are:<\/p>\n<\/div><\/div>\n<div class=\"raw-import aem-GridColumn--default--none aem-GridColumn--default--9 aem-GridColumn aem-GridColumn--offset--default--2\">\n<div class=\"text-container\">\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 10pt; line-height: 16.866666793823242px; font-size: 11pt; font-family: Arial, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start;\">&nbsp;<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>The output of the commands executed on the victim machines are not being returned to the server.<\/p>\n<p>It\u2019s interesting to note that the Ex command indicates that the malware author aimed to continue operating with additional JavaScript-based payloads. This indicates that the developer feels more comfortable using JavaScript as his \u201cgo-to\u201d programming language.<\/p>\n<p>During our research, we also noticed that the\u00a0<i>X-Powered-By<\/i>\u00a0header in the response was \u201cExpress\u201d. This serves as another indication of the author\u2019s affection for JavaScript since it suggests the server was built using the widely popular\u00a0<a href=\"https:\/\/expressjs.com\/\"><i>Express<\/i><\/a>\u00a0framework for NodeJS.<\/p>\n<h2>Replacing Crypto Wallets<\/h2>\n<p>One of the goals of ViperSoftX is to steal cryptocurrency. Thus, after every command execution, ViperSoftX checks the content of the clipboard using the following code:<\/p>\n<\/p><\/div>\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\">\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 10pt; line-height: 16.866666793823242px; font-size: 11pt; font-family: Arial, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start;\"><span style=\"font-family: 'Courier New';\">WScript.CreateObject(&ldquo;htmlfile&rdquo;).parentWindow.clipboardData.getData(&ldquo;text&rdquo;)<\/span><\/p>\n<\/div><\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>It then checks to see if the content matches either of two regex patterns that aim to match either a\u00a0<i>Bitcoin\u00a0<\/i>or an\u00a0<i>Ethereum\u00a0<\/i>address. In case of a match, and if the addresses are different from the addresses hardcoded in ViperSoftX, it sets the clipboard data to its own addresses.\u00a0<\/p>\n<p>Changing the clipboard data is done based on the OS version. On Windows 10 it uses PowerShell\u2019s\u00a0<a href=\"https:\/\/docs.microsoft.com\/en-us\/powershell\/module\/microsoft.powershell.management\/set-clipboard?view=powershell-7\">scp<\/a>. Otherwise, it runs cmd as follows:<\/p>\n<\/p><\/div>\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\">\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 10pt; line-height: 16.866666793823242px; font-size: 11pt; font-family: Arial, sans-serif; color: #000000; font-style: normal; font-weight: normal; text-align: start;\"><span style=\"font-family: 'Courier New';\">Cmd.exe \/c echo|set \/p=[address to set]|clip<\/span><\/p>\n<\/div><\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>After examining ViperSoftX\u2019s Bitcoin and Ethereum addresses hardcoded in the malware, we can conclude the following:<\/p>\n<ul>\n<li>There\u2019s a matching BCH address that had only 1 transaction on 2020-01-17. This address holds a total sum of 1.00962178 BCH, which is worth 379.51 USD.<\/li>\n<li>There\u2019s a matching BTC address that has had\u00a0<b>125<\/b>\u00a0transactions, the most recent of which occurred on 2020-01-17, while the earliest occurred on 2019-06-20. The total balance of the wallet is 3.37562306 BTC, which translates to 31,085.29 USD.<\/li>\n<li>The matching Ethereum address holds a total sum of 7<b style=\"\">.<\/b><span style=\"\">436753340964695808 Ether, which is worth 1,394.18 USD.\u00a0<\/span><\/li>\n<\/ul>\n<p>The current total sum of all of the above mentioned wallets stands at 32,858.98 USD. While this is not a significant amount, this is only one campaign of this newly discovered threat which has only operated for a short while, and may only be the start of bigger, more successful campaigns. Also, as this threat has RAT capabilities, we don\u2019t know if this was the only goal of the threat actor. For example, the threat actor might also be selling stolen data.\u00a0 <\/p>\n<p>The following Ethereum activity graphs also indicate the campaign\u2019s activity phases and reflect the steady growth of activity of ViperSoftX since late 2019, along with a stable increase of revenue since the first time it was detected in the wild:<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--10 aem-GridColumn--offset--default--1\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/vipersoftx-new-javascript-threat\/_jcr_content\/root\/responsivegrid\/image_1163989539.img.png\/1581661747043\/picture3.png\" alt=\"Figure 3: Ethereum Balance Graph showing growth over time\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 3: Ethereum Balance Graph showing growth over time<\/span>         <\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--10 aem-GridColumn--offset--default--1\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/vipersoftx-new-javascript-threat\/_jcr_content\/root\/responsivegrid\/image_1388268319.img.png\/1581661800603\/picture4.png\" alt=\"Figure 4: Ethereum Transactions Activity over time\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 4: Ethereum Transactions Activity over time<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<h2>Conclusion<\/h2>\n<p>JavaScript-based malware are becoming more, and ViperSoftX is a good example of this trend. <\/p>\n<p>While its functionality is rather simple, its download and execute capabilities make it a threat that should be closely monitored by defenders in case its operators decide to use it as a platform for additional operations by leveraging its RAT functionality. It can potentially be used for any other type of functionality, such as execution of ransomware.<\/p>\n<p>It\u2019s also possible that we are only seeing the first stages of ViperSoftX. If it is still in active development we might encounter more advanced and sophisticated versions of it in the future.<\/p>\n<h2>Solutions<\/h2>\n<p>FortiEDR detects and blocks ViperSoftX out-of-the-box without any prior knowledge or special configuration.<\/p>\n<p>FortiGuard IPS detects ViperSoftX as\u00a0<b>JS\/ViperSoft.A!tr<\/b><\/p>\n<p>FortiGuard Web filtering categorizes the network IOC as\u00a0<b>Malicious Websites<\/b><\/p>\n<p>ViperSoftX can also be easily detected using a standard network monitoring mechanism. It\u2019s plain-text communication, along with usage of non-standard headers, make it stand out from otherwise normal traffic.<\/p>\n<p> In addition, as part of our membership in the\u00a0<a href=\"https:\/\/www.cyberthreatalliance.org\/\">Cyber Threat Alliance<\/a>, details of this threat were shared in real time with other Alliance members to help create better protections for customers.<\/p>\n<h2>IOCs<\/h2>\n<p><b>SHA256 &#8211;<\/b><\/p>\n<p>65cb35d1b09097aa64b89062a060b3bb680bc4c962ff116f32edf92735f401eb<\/p>\n<p>4bb342c21ff563454d2fdc25eb3e63731d06d20c1fca2522061ad1ef38a53c89<\/p>\n<p>391e4b6ffb90303547d20baaa5695f2c0191f5461bb20cb885e170dd019e017c<\/p>\n<p>9e63d2ac3dc280a25c27a126752fdde1c8c5a0c4b4990f479a44dd8441b22ab3<\/p>\n<p><b>C&amp;C Server Domain Name &#8211;<\/b><\/p>\n<p>seko[.]vipers[.]pw<\/p>\n<p><b>Bitcoin address &#8211;<\/b><\/p>\n<p>1PRMMQgM65KDtMTryu9ccpeAgUmKqDrE9M<\/p>\n<p><b>Ethereum address &#8211;<\/b><\/p>\n<p>0x9d787053f9839966A664b0e14e9C26a3684F6E44<\/p>\n<h2>Appendix A &#8211; MITRE Techniques<br \/> <\/h2>\n<p><a href=\"https:\/\/attack.mitre.org\/techniques\/T1059\/\">T1059 &#8211; Command-Line Interface\u00a0<\/a><\/p>\n<p><a href=\"https:\/\/attack.mitre.org\/techniques\/T1086\/\">T1086 &#8211; PowerShell<\/a><\/p>\n<p><a href=\"https:\/\/attack.mitre.org\/techniques\/T1064\/\">T1064 &#8211; Scripting<\/a><\/p>\n<p><a href=\"https:\/\/attack.mitre.org\/techniques\/T1047\/\">T1047 &#8211; Windows Management Instrumentation<\/a><\/p>\n<p><a href=\"https:\/\/attack.mitre.org\/techniques\/T1060\/\">T1060 &#8211; Startup Folder<\/a><\/p>\n<p><a href=\"https:\/\/attack.mitre.org\/techniques\/T1023\/\">T1023 &#8211; Shortcut Modification<\/a><\/p>\n<p><a href=\"https:\/\/attack.mitre.org\/techniques\/T1140\/\">T1140 &#8211; Deobfuscate\/Decode Files or Information<\/a><\/p>\n<p><a href=\"https:\/\/attack.mitre.org\/techniques\/T1063\/\">T1063 &#8211; Security Software Discovery<\/a><\/p>\n<p><a href=\"https:\/\/attack.mitre.org\/techniques\/T1082\/\">T1082 &#8211; System Information Discovery<\/a><\/p>\n<p><a href=\"https:\/\/attack.mitre.org\/techniques\/T1033\/\">T1033 &#8211; System Owner\/User Discovery<\/a><\/p>\n<p><a href=\"https:\/\/attack.mitre.org\/techniques\/T1115\/\">T1115 &#8211; Clipboard Data<\/a><\/p>\n<p><a href=\"https:\/\/attack.mitre.org\/techniques\/T1005\/\">T1005 &#8211; Data from Local System<\/a><\/p>\n<p><i>Learn how\u00a0<a href=\"https:\/\/www.fortinet.com\/fortiguard\/threat-intelligence\/threat-research.html?utm_source=nreleaseblog&amp;utm_campaign=2018-q2-fortiguardlabs-cta\">FortiGuard Labs<\/a>\u00a0provides\u00a0unmatched security and intelligence services using integrated AI systems.<\/i><\/p>\n<p><i>Find out about the FortiGuard Security Services\u00a0<a href=\"https:\/\/www.fortinet.com\/support\/support-services\/fortiguard-security-subscriptions.html?utm_source=blog&amp;utm_campaign=2018-blog-security-services\">portfolio<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.fortinet.com\/fortiguard\/threat-intelligence\/threat-research.html?utm_source=nreleaseblog&amp;utm_campaign=2018-q2-fortiguardlabs-cta\">sign up<\/a>\u00a0for our weekly FortiGuard Threat Brief.<\/i><\/p>\n<p><i>Discover how the FortiGuard\u00a0<a href=\"https:\/\/www.fortinet.com\/support\/support-services\/fortiguard-security-subscriptions\/security-rating.html?utm_source=blog&amp;utm_campaign=2018-blog-security-rating-service\">Security Rating Service<\/a>\u00a0provides security audits and best practices to guide customers in designing, implementing, and maintaining the security posture best suited for their organization.<\/i><\/p>\n<\/p><\/div>\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\">\n<div id=\"om-qxx1b0gslklfu2kjckea-holder\"><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p><a href=\"http:\/\/feedproxy.google.com\/~r\/fortinet\/blog\/threat-research\/~3\/CousvluoJc0\/vipersoftx-new-javascript-threat.html\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/fortinet\/blog\/threat-research<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"\/blog\/threat-research\/vipersoftx-new-javascript-threat\/_jcr_content\/root\/responsivegrid\/image.img.png\/1581661050686\/picture1.png\"\/><br \/>Learn more about the newly discovered JavaScript-based Remote Access Trojan (RAT) and cryptocurrency stealer, which we have dubbed \u201cViperSoftX\u201d recently captured by our FortiGuard Labs team.&lt;img src=&#8221;http:\/\/feeds.feedburner.com\/~r\/fortinet\/blog\/threat-research\/~4\/CousvluoJc0&#8243; height=&#8221;1&#8243; width=&#8221;1&#8243; alt=&#8221;&#8221;\/&gt;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10424,10378],"tags":[],"class_list":["post-17744","post","type-post","status-publish","format-standard","hentry","category-fortinet","category-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17744","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17744"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17744\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17744"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17744"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}