Close Menu
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
Facebook X (Twitter) Instagram
Trending
  • Jennifer Lopez and Ben Affleck reveal summer plans after Europe trip
  • T20 World Cup: Quiet contributions from Akshar Patel, Kuldeep Yadav and Ravindra Jadeja justify Rohit Sharma’s spin vision | Cricket News
  • The impact of a sedentary lifestyle on health
  • Bartok: The World of Lilette
  • Economists say the sharp rise in the U.S. budget deficit will put a strain on Americans’ incomes
  • Our Times: Williams memorial unveiled on July 4th | Lifestyle
  • Heatwaves in Europe are becoming more dangerous: what it means for travelers
  • Christian Science speaker to visit Chatauqua Institute Sunday | News, Sports, Jobs
Facebook X (Twitter) Instagram
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
The Daily PostingThe Daily Posting
Europe

APT28 hacker group spreads phishing scam targeting Europe, America, and Asia

thedailyposting.comBy thedailyposting.comMarch 18, 2024No Comments

[ad_1]

March 18, 2024news roomCyberwar/Malware

Widespread phishing techniques

Russian-linked threat actor known as APT28 is believed to be linked to multiple ongoing phishing campaigns using decoy documents imitating governments and non-governmental organizations (NGOs) in Europe, the South Caucasus, Central Asia, and the Americas.

“The decoys uncovered include a mix of internal and public documents, as well as documents related to finance, critical infrastructure, executive engagement, cybersecurity, maritime security, healthcare, business, and defense industry production. It also includes documents that may have been created by the actors,” IBM X said. -Fors said in a report released last week.

The technology company tracks its activities under the nickname ITG05. This activity is also known as Blue Athena, BlueDelta, Fancy Bear, Fighting Ursa, Forest Blizzard (formerly Strontium), FROZENLAKE, Iron Twilight, Pawn Storm, Sednit, Sofacy, and TA422. UAC-028.

cyber security

This disclosure comes more than three months after adversaries were discovered using decoys linked to the ongoing Israel-Hamas war to distribute a custom backdoor called HeadLace. It was done.

Since then, APT28 has also targeted Ukrainian government agencies and Polish organizations with phishing messages aimed at deploying custom implants and information theft techniques such as MASEPIE, OCEANMAP, and STEELHOOK.

Other campaigns have exploited a security flaw in Microsoft Outlook (CVE-2023-23397, CVSS score: 9.8) to loot NT LAN Manager (NTLM) v2 hashes, allowing attackers to The possibility of stealing NTLMv2 hashes is increasing. Used for relay attacks.

Widespread phishing techniques

The latest campaign, observed by IBM X-Force from late November 2023 to February 2024, leverages the Microsoft Windows “search-ms:” URI protocol handler to trick victims into giving attackers control. downloads malware hosted on a WebDAV server.

There is evidence to suggest that both the WebDAV server and MASEPIE C2 server may be hosted on a compromised Ubiquiti router. The botnet that made up the Ubiquiti router was taken down by the US government last month.

cyber security

The phishing attack impersonated organizations from countries including Argentina, Ukraine, Georgia, Belarus, Kazakhstan, Poland, Armenia, Azerbaijan, and the United States, and used a combination of publicly available legitimate government and non-government documents to activate the infection. I will make it. chain.

“To update our methodology, ITG05 uses firstcloudit, a free hosting provider.[.]com stages the payload to enable continued operation,” said security researchers Joe Fasulo, Claire Zaboeva, and Golo Mühr.

APT28’s elaborate scheme culminates in the execution of MASEPIE, OCEANMAP, and STEELHOOK, which are designed to extract files, execute arbitrary commands, and steal browser data. OCEANMAP is characterized as a more sophisticated version of CredoMap, another backdoor previously identified as being used by the group.

“ITG05 continues to adapt to changing opportunities by consistently evolving its malware capabilities, offering new infection techniques, and leveraging off-the-shelf infrastructure,” the researchers concluded.

Did you find this article interesting? Follow us twitter ○ You can read more exclusive content from us on LinkedIn.



[ad_2]

Source link

thedailyposting.com
  • Website

Related Posts

Jennifer Lopez and Ben Affleck reveal summer plans after Europe trip

June 29, 2024

Heatwaves in Europe are becoming more dangerous: what it means for travelers

June 28, 2024

Mifflin County Travel Club’s European Adventures | News, Sports, Jobs

June 28, 2024
Leave A Reply Cancel Reply

ads
© 2025 thedailyposting. Designed by thedailyposting.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms of Service
  • Advertise with Us
  • 1711155001.38
  • xtw183871351
  • 1711198661.96
  • xtw18387e4df
  • 1711246166.83
  • xtw1838741a9
  • 1711297158.04
  • xtw183870dc6
  • 1711365188.39
  • xtw183879911
  • 1711458621.62
  • xtw183874e29
  • 1711522190.64
  • xtw18387be76
  • 1711635077.58
  • xtw183874e27
  • 1711714028.74
  • xtw1838754ad
  • 1711793634.63
  • xtw183873b1e
  • 1711873287.71
  • xtw18387a946
  • 1711952126.28
  • xtw183873d99
  • 1712132776.67
  • xtw183875fe9
  • 1712201530.51
  • xtw1838743c5
  • 1712261945.28
  • xtw1838783be
  • 1712334324.07
  • xtw183873bb0
  • 1712401644.34
  • xtw183875eec
  • 1712468158.74
  • xtw18387760f
  • 1712534919.1
  • xtw183876b5c
  • 1712590059.33
  • xtw18387aa85
  • 1712647858.45
  • xtw18387da62
  • 1712898798.94
  • xtw1838737c0
  • 1712953686.67
  • xtw1838795b7
  • 1713008581.31
  • xtw18387ae6a
  • 1713063246.27
  • xtw183879b3c
  • 1713116334.31
  • xtw183872b3a
  • 1713169981.74
  • xtw18387bf0d
  • 1713224008.61
  • xtw183873807
  • 1713277771.7
  • xtw183872845
  • 1713329335.4
  • xtw183874890
  • 1716105960.56
  • xtw183870dd9
  • 1716140543.34
  • xtw18387691b

Type above and press Enter to search. Press Esc to cancel.