Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » TA558 Hackers use images to launch large-scale malware attacks
    Cyber Security

    TA558 Hackers use images to launch large-scale malware attacks

    techempireBy techempire1 Comment3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportApril 16, 2024Editorial DepartmentThreat Intelligence/Endpoint Security

    Malware attack

    Threat actors tracked as TA558 It has been observed that steganography is used as an obfuscation technique to spread various malware, such as Agent Tesla, FormBook, Remcos RAT, LokiBot, GuLoader, Snake Keylogger, and XWorm.

    “The group made extensive use of steganography by sending VBS, PowerShell code, as well as RTF files, internal images and text files with embedded vulnerabilities,” Russian cybersecurity firm Positive Technologies said in a report on Monday. “

    The campaign was codenamed SteganoAmor due to its reliance on steganography and the choice of filenames such as Greatloverstory.vbs and easytolove.vbs.

    Most attacks targeted the industrial, service, public, power and construction sectors in Latin American countries, but companies in Russia, Romania and Turkey were also targeted.

    Internet security

    At the same time, TA558 was also found deploying Venom RAT through phishing attacks targeting companies in Spain, Mexico, the United States, Colombia, Portugal, Brazil, the Dominican Republic, and Argentina.

    It all started with a phishing email containing a booby-trapped Microsoft Excel attachment that exploited a now-patched security flaw (CVE-2017-11882) in the Equation Editor to download a Visual Basic script that would fetch the next Stage affixed payload[.]Yes.

    The obfuscated malicious code is responsible for downloading two images from external URLs that embed Base64-encoded components, ultimately retrieving and executing the Agent Tesla malware on the infected host.

    Malware attack

    In addition to Agent Tesla, other variants of the attack chain have led to the emergence of various malware, such as FormBook, GuLoader, LokiBot, Remcos RAT, Snake Keylogger and XWorm, which are designed for remote access, data theft and Designed to assist in the delivery of payloads.

    Phishing emails are sent from legitimate but compromised SMTP servers in order to give the message a level of credibility and minimize the likelihood of it being blocked by email gateways. In addition, TA558 was also found to be using infected FTP servers to store stolen data.

    The disclosure comes against the backdrop of a series of phishing attacks against government organizations in Russia, Belarus, Kazakhstan, Uzbekistan, Kyrgyzstan, Tajikistan and Armenia, with attackers using malware called LazyStealer to harvest credentials from Google Chrome.

    Internet security

    Positive Technologies is tracking a cluster of activity called Lazy Koala, named after the user (joekoala), who is said to control the Telegram bot that received the stolen material.

    That said, victim geolocation and malware artifacts indicate a potential connection to another hacker group tracked by Cisco Talos called YoroTrooper (also known as SturgeonPhisher).

    Security researcher Vladislav Lunin said: “The main tool of the group is a primitive stealer whose protection helps evade detection, slow down analysis, obtain all stolen data and send it to Telegram, which has been under attack for years Malicious actors welcome.

    The findings are accompanied by a series of social engineering campaigns aimed at spreading malware families such as FatalRAT and SolarMarker.

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.