Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » RedCurl cybercrime group abuses Windows PCA tools for corporate espionage
    Cyber Security

    RedCurl cybercrime group abuses Windows PCA tools for corporate espionage

    techempireBy techempire3 Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportMarch 14, 2024Editorial DepartmentCyber ​​espionage/malware

    malware

    The Russian-speaking cybercriminal organization is named red curly hair A legitimate Microsoft Windows component called the Program Compatibility Assistant (PCA) is exploited to execute malicious commands.

    “The Program Compatibility Assistant Service (pcalua.exe) is a Windows service designed to identify and resolve compatibility issues with older programs,” Trend Micro said in an analysis report released this month.

    “Adversaries could exploit this utility to enable command execution and bypass security restrictions by using it as an alternative command line interpreter. In this investigation, threat actors used this tool to mask their activities.”

    Internet security

    RedCurl, also known as Earth Kapre and Red Wolf, has been active since at least 2018, organizing corporate cyber espionage attacks against entities located in Australia, Canada, Germany, Russia, Slovenia, the United Kingdom, Ukraine and the United States.

    In July 2023, FACCT revealed that a major Russian bank and an Australian company were targeted by threat actors in November 2022 and May 2023, stealing confidential company secrets and employee information.

    The attack chain examined by Trend Micro requires the use of phishing emails containing malicious attachments (.ISO and .IMG files) to initiate a multi-stage process that first uses cmd.exe to remotely download a legitimate file named “curl” The utility server then acts as a conduit to the loader (ms.dll or ps.dll).

    In turn, the malicious DLL file uses PCA to spawn a downloader process, which is responsible for establishing a connection to the same domain used by curl to obtain the loader.

    The Impacket open source software was also used in the attack to execute unauthorized commands.

    The connection to Earth’s Kapre stems from overlap in command and control (C2) infrastructure and similarity to known downloader artifacts used by the group.

    “This case highlights the ongoing and active threat posed by Earth Kapre, which targets a variety of industries in multiple countries,” Trend Micro said.

    Internet security

    “The attackers used sophisticated tactics, such as abusing PowerShell, curl, and the Program Compatibility Assistant (pcalua.exe) to execute malicious commands, demonstrating their dedication to evading detection within the target network.”

    This development comes as Russian nation-state group Turla (aka Iron Hunter, Peptic Ursa, Secret Blizzard, Snake, Uroburos, Venomous Bear, and Waterbug) begins deploying the .NET-based Kazul backdoor using a new wrapper DLL codenamed Pelmeni .

    Pelmeni – disguised as a library related to SkyTel, NVIDIA GeForce Experience, vncutil or ASUS – loaded via DLL sideloading. Lab52 said that once the legitimate software installed on the machine calls the spoofed DLL, it decrypts and launches Kazuar.

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.