News

Iranian hackers from Tortoiseshell attack retired US military

Cisco Talos experts discovered a malicious site created by Iranian hackers from the Tortoiseshell group through which they attack former US military and try to infect their devices with malware.

The resource is located at hiremilitaryheroes [.] Com and supposedly offers jobs to retired military personnel. To get access to job offers, you need to download a special desktop application. It, of course, is a fake and only installs malware on the machine, while showing the user a fake error message during installation.

“One of the binaries is a tool used to perform a reconnaissance stage on the system and the second is the Remote Administrative Tool. The RAT is executed as a service. The installer installs the service first (for the -install argument) and then stops/starts the service with the command and control (C2) server IP in argument,” — Warren Mercer and Paul Rascagneres of Talos said in a post on the new campaign.

Warren Mercer
Warren Mercer

Having penetrated the system, the malware collects information about the technical characteristics of the infected machine and transfers the collected data to the Gmail mailbox, controlled by attackers.

Therefore, the malware collects information about the operating system, the number of processors, network configuration, peripheral equipment, firmware versions, domain controller, administrator name, account list, system date and time, drivers, and so on. Obviously, this data can be useful for attackers to organize further attacks.

In addition, a remote access Trojan is installed in the system, which is able to run files downloaded from outside, execute sell commands and, if necessary, can delete itself from the host computer.

Read also: XHunt cybercriminal band attacked Gulf shipping companies

Researchers at Cisco Talos write that they don’t know what methods hackers could use to distribute links to this site, since the experts did not find anything.

The Talos team said it did not have any reports of successful compromises from this campaign and stressed that this campaign is not an advanced one.

“The level of sophistication is low as the .NET binary used has poor OPSEC capabilities, such as hard-coded credentials, but then other more advanced techniques by making the malware modular and aware that the victim already ran it”, — Mercer and Rascagneres said.

It is assumed that the resource could be discovered before the attackers began to actively advertise it among the military.

Experts associate this campaign with the recently spotted hacker group Tortoiseshell, allegedly led by the Iranian government. There is no much information available about this group so far, apart from the Symantec report released last week.

According to Symantec, this group previously participated in supply chain attacks targeting 11 Saudi Arabian IT providers. It is believed that the purpose of these attacks was to use the infrastructure of compromised companies to deliver malware to their customers’ networks.
Sending
User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

Daniel Zimmermann

Daniel Zimmermann has been writing on security and malware subjects for many years and has been working in the security industry for over 10 years. Daniel was educated at the Saarland University in Saarbrücken, Germany and currently lives in New York.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Sending

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back to top button