Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Rust-based malware targets Indian government entities
    Cyber Security

    Rust-based malware targets Indian government entities

    techempireBy techempireNo Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportDecember 22, 2023Editorial DepartmentMalware/Internet threats

    Rust-based malware

    Indian government entities and the defense sector have been targeted by phishing campaigns designed to deliver Rust-based malware for intelligence gathering.

    The activity was first detected in October 2023 and was codenamed RusticWeb Action Developed by enterprise security company SEQRITE.

    “New Rust-based payloads and encrypted PowerShell commands have been used to exfiltrate confidential files to a web-based serving engine instead of a dedicated command and control (C2) server,” said security researcher Sathwik Ram Prakki.

    Tactical overlap has been identified between this cluster and those of the widely tracked “Transparent Tribe” and “SideCopy” clusters, both of which are assessed to be linked to Pakistan.

    SideCopy is also a suspiciously subordinate element in Transparent Tribe. Last month, SEQRITE detailed multiple campaigns launched by this threat actor targeting Indian government agencies to spread numerous Trojans including AllaKore RAT, Ares RAT, and DRat.

    Upcoming webinars

    From user to administrator: Learn how hackers gain total control

    Learn the secret tactics hackers use to become administrators and how to detect and stop it before it’s too late. Register now for our webinar.

    Join now

    Other recent attack chains documented by ThreatMon have used decoy Microsoft PowerPoint files and specially crafted RAR archives vulnerable to CVE-2023-38831 to spread malware, allowing unrestricted remote access and control.

    ThreatMon noted earlier this year: “The SideCopy APT group’s infection chain involves multiple steps, each carefully planned to ensure a successful compromise.”

    The latest set of attacks begins with phishing emails that use social engineering techniques to trick victims into interacting with malicious PDF files, which drop a Rust-based payload used to enumerate the file system in the background while sending the victim Show decoy files.

    Rust-based malware

    In addition to collecting files of interest, the malware can also collect system information and transmit it to a C2 server, but lacks the functionality of other advanced stealing malware found in the cybercrime underground.

    A second infection chain discovered by SEQRITE in December used a similar multi-stage process, but replaced the Rust malware with a PowerShell script responsible for the enumeration and exfiltration steps.

    But interestingly, the final stage payload is launched through a Rust executable called “Cisco AnyConnect Web Helper”. The collected information is finally uploaded to oshi[.]at domain, an anonymous public file sharing engine called OshiUpload.

    “Operation RusticWeb may be related to the APT threat as it shares similarities with multiple groups linked to Pakistan,” Ram Prakki said.

    Internet security

    Nearly two months ago, Cyble discovered a malicious Android app used by the DoNot team targeting individuals in Kashmir, India.

    The nation-state attacker, also known as APT-C-35, Origami Elephant and SECTOR02, is believed to be of Indian origin and has a history of using Android malware to infiltrate devices of people in Kashmir and Pakistan.

    The variant examined by Cyble is a Trojanized version of an open source GitHub project called “QuranApp: Read and Explore”, which is equipped with various spyware features and can record audio and VoIP calls, capture screenshots, and collect data from various applications. data, download other APK files and track the victim’s location.

    “The DoNot group’s ongoing efforts to improve its tools and techniques underscore the ongoing threat they pose, particularly against individuals in India’s sensitive Kashmir region,” Sable said.

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.