Also known as: DirtyMoe, NuggetPhantom, Perkiler
Category: Malware
Type: Backdoor trojan, worm, rootkit
Platform: Windows
Damage potential: Remote device access and control, resource hijacking for cryptocurrency mining, lateral network spread, DDoS participation, and security tool evasion.
Overview
PurpleFox is a type of malware that spreads across Windows systems. It uses rootkit capabilities and a botnet infrastructure to stay hidden and persist even after the device reboots
This trojan can infect systems through phishing attacks, exploiting vulnerabilities, or brute-forcing weak credentials over Server Message Block (SMB) — a protocol that lets Windows computers to share files. PurpleFox is a wormable malware, meaning it can automatically spread from one vulnerable computer to another, increasing its impact across networks.
Once inside, PurpleFox can deploy additional malware such as cryptocurrency miners, ransomware, or spyware, giving attackers both control and potential profits. It can also act as a bot for distributed denial-of-service (DDoS) attacks. With advanced evasion techniques and encrypted communications, PurpleFox is difficult to detect and even harder to remove.
Possible symptoms
Possible symptoms of a PurpleFox infection include:
- Slow system performance.
- Unknown processes running in the background.
- Sudden system crashes or reboots.
- Presence of unknown files (files you didn’t download or install yourself).
- Increased CPU or memory usage.
- Unexpected changes in desktop or system settings.
Sources of the infection
The sources of infection for PurpleFox are similar to those of many trojans and can include:
- Phishing links. Clicking on malicious links, malvertising, or opening unsafe attachments from phishing emails, spam posts on forums, YouTube comments, SMS messages, or messaging apps can lead to a PurpleFox infection.
- Drive-by downloads. Users may accidentally download PurpleFox when they visit a compromised website.
- Compromised software downloads. Downloading software from untrusted sources can risk a PurpleFox infection if the software package is compromised and contains malware.
- Exploiting cybersecurity vulnerabilities. PurpleFox is known to exploit security vulnerabilities, particularly in the Windows SMB protocol, to infect devices and spread laterally within networks.
- File-sharing platforms or peer-to-peer (P2P) networks. Using P2P networks or file-sharing sites to download cracked software or pirated media can also expose users to PurpleFox.
Protection
The most important advice to avoid PurpleFox infections is to download software only from trusted sources. Additionally, consider these measures to further protect your device and personal information:
- Regularly update your software. PurpleFox is known to target security vulnerabilities, particularly in Windows. Keep your software updated to protect your devices against known exploits.
- Enable multi-factor authentication (MFA). While multi-factor authentication itself can’t prevent a PurpleFox infection, it can help protect your accounts if credentials are stolen.
- Be wary of phishing emails. PurpleFox can spread via phishing and spam emails. If you get an email that sounds off or urges you to click on a link, act with caution.
- Stay alert while browsing. Hackers may use malicious ads or create fake websites that look legitimate to spread PurpleFox and other trojans. Pay close attention to the websites you visit, and be cautious about the links you click on.
- Use NordVPN’s Threat Protection Pro™. Tools like NordVPN’s Threat Protection Pro™ can block access to known malicious sites, adding an additional layer of protection while browsing online.
PurpleFox removal
Removing PurpleFox can be challenging due to its rootkit, which helps it stay hidden. However, specific methods can detect and remove it effectively. Follow this step-by-step guide to eliminate all traces of the malware.
- 1.Disconnect from the internet. Start by disconnecting your computer from the internet to prevent the malware from downloading additional components or communicating with its command-and-control (C2) servers.
- 2.Run a full scan with Microsoft Defender. Open Microsoft Defender, go to “Virus & threat protection,” and select “Full scan.” This step can detect and remove surface-level threats, though it may miss hidden rootkit components.
- 3.Use a dedicated rootkit removal tool. Run a specialized rootkit removal tool to detect and eliminate hidden rootkit elements.
- 4.Reboot in safe mode. This step is optional. Restart your computer in Safe Mode (press F8 during startup) and run your rootkit removal tool again. Safe Mode limits active processes, which can make it easier to detect hidden malware.
- 5.Run a final full scan. After removing rootkit components, perform a final full scan with your antivirus software to confirm all traces of the malware are gone.
If PurpleFox is still causing problems, consider consulting with a cybersecurity professional to ensure full removal.