Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » UAC-0050 Group uses new phishing tactics to distribute Remcos RAT
    Cyber Security

    UAC-0050 Group uses new phishing tactics to distribute Remcos RAT

    techempireBy techempire3 Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportJanuary 4, 2024Editorial DepartmentSoftware Security/Malware

    Remkos

    A threat actor named UAC-0050 is leveraging phishing attacks to distribute Remcos RAT using new tactics to evade detection by security software.

    “The group’s weapon of choice is Remcos RAT, a notorious remote surveillance and control malware that has long been at the forefront of its espionage arsenal,” Uptycs security researchers Karthick Kumar and Shilpesh Trivedi said in a report on Wednesday. Forefront.”

    “However, in the latest operational changes, the UAC-0050 group has integrated a pipeline approach for inter-process communication, demonstrating its advanced adaptability.”

    UAC-0050 has been active since 2020 and has historically targeted entities in Ukraine and Poland through social engineering campaigns, impersonating legitimate organizations to trick recipients into opening malicious attachments.

    Internet security

    In February 2023, Ukraine’s Computer Emergency Response Team (CERT-UA) blamed attackers on a phishing campaign designed to spread the Remcos RAT.

    The same Trojan has been distributed as part of at least three different phishing waves over the past few months, with one such attack also resulting in the deployment of an information-stealing program called Meduza Stealer.

    Uptycs’ analysis is based on LNK files it discovered on December 21, 2023. While the exact initial access vector is not yet known, it is suspected to involve phishing emails targeting Ukrainian military personnel claiming to have advisory roles within the Israel Defense Forces (Israel Defense Forces).

    Remkos

    The associated LNK file collects information about the antivirus products installed on the target computer and then uses mshta.exe (a Windows native binary file used to run HTA files) to retrieve and execute a file named “6.hta” from the remote server. HTML application.

    This step paves the way for the PowerShell script to unzip another PowerShell script to download two files named “word_update.exe” and “ofer.docx” from the new-tech-savvy domain[.]com.

    Executing word_update.exe causes it to create a copy of itself named fmTask_dbg.exe and establish persistence by creating a shortcut to a new executable file in the Windows Startup folder.

    Internet security

    This binary also uses unnamed pipes to facilitate the exchange of data between itself and the newly spawned cmd.exe child process in order to eventually decrypt and launch the Remcos RAT (version 4.9.2 Pro), which can collect system data and data from Cookies and login information for web browsers such as Internet Explorer, Mozilla Firefox and Google Chrome.

    “Utilizing pipes within the Windows operating system provides a covert channel for data transmission, cleverly evading detection by endpoint detection and response (EDR) and anti-virus systems,” the researchers said.

    “While not entirely new, this technology marks a significant leap in the organization’s strategic sophistication.”

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Pokémon Trading Card Website Making 100k!

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    GTA 6 Release Date

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.