US Cybersecurity Division (Cybersecurity and Infrastructure Security Agency, CISA), belonging to the US Department of…
“One of the binaries is a tool used to perform a reconnaissance stage on the system and the second is the Remote Administrative Tool. The RAT is executed as a service. The installer installs the service first (for the -install argument) and then stops/starts the service with the command and control (C2) server IP in argument,” — Warren Mercer and Paul Rascagneres of Talos said in a post on the new campaign.
Having penetrated the system, the malware collects information about the technical characteristics of the infected machine and transfers the collected data to the Gmail mailbox, controlled by attackers.
Therefore, the malware collects information about the operating system, the number of processors, network configuration, peripheral equipment, firmware versions, domain controller, administrator name, account list, system date and time, drivers, and so on. Obviously, this data can be useful for attackers to organize further attacks.
In addition, a remote access Trojan is installed in the system, which is able to run files downloaded from outside, execute sell commands and, if necessary, can delete itself from the host computer.
Read also: XHunt cybercriminal band attacked Gulf shipping companies
Researchers at Cisco Talos write that they don’t know what methods hackers could use to distribute links to this site, since the experts did not find anything.
The Talos team said it did not have any reports of successful compromises from this campaign and stressed that this campaign is not an advanced one.
“The level of sophistication is low as the .NET binary used has poor OPSEC capabilities, such as hard-coded credentials, but then other more advanced techniques by making the malware modular and aware that the victim already ran it”, — Mercer and Rascagneres said.
It is assumed that the resource could be discovered before the attackers began to actively advertise it among the military.
Experts associate this campaign with the recently spotted hacker group Tortoiseshell, allegedly led by the Iranian government. There is no much information available about this group so far, apart from the Symantec report released last week.
Franoapas.co.in is a site that tries to trick you into clik to its browser notifications…
News-xwamovi.cc is a site that tries to force you into clik to its browser notifications…
Happybase.xyz is a site that tries to force you into clik to its browser notifications…
Kentosim.xyz is a domain that tries to force you into clik to its browser notifications…
News-xhunoyi.cc is a domain that tries to force you into clik to its browser notifications…
Dingaber.xyz is a domain that tries to trick you into clik to its browser notifications…