European – INDIA NEWS http://www.indiavpn.org News Blog Thu, 21 Mar 2024 17:28:23 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.1 Russia Hackers Using TinyTurla-NG to Breach European NGO’s Systems http://www.indiavpn.org/2024/03/21/russia-hackers-using-tinyturla-ng-to-breach-european-ngos-systems/ http://www.indiavpn.org/2024/03/21/russia-hackers-using-tinyturla-ng-to-breach-european-ngos-systems/#respond Thu, 21 Mar 2024 17:28:23 +0000 https://www.indiavpn.org/2024/03/21/russia-hackers-using-tinyturla-ng-to-breach-european-ngos-systems/ [ad_1]

Mar 21, 2024NewsroomThreat Intelligence / Malware

Russia Hackers

The Russia-linked threat actor known as Turla infected several systems belonging to an unnamed European non-governmental organization (NGO) in order to deploy a backdoor called TinyTurla-NG.

“The attackers compromised the first system, established persistence and added exclusions to antivirus products running on these endpoints as part of their preliminary post-compromise actions,” Cisco Talos said in a new report published today.

“Turla then opened additional channels of communication via Chisel for data exfiltration and to pivot to additional accessible systems in the network.”

There is evidence indicating that the infected systems were breached as early as October 2023, with Chisel deployed in December 2023 and data exfiltrating taking place via the tool a month later, around January 12, 2024.

Cybersecurity

TinyTurla-NG was first documented by the cybersecurity company last month after it was found to be used in connection with a cyber attack targeting a Polish NGO working on improving Polish democracy and supporting Ukraine during the Russian invasion.

Cisco Talos told The Hacker News at the time that the campaign appears to be highly targeted and focused on a small number of organizations, most of which are located in Poland.

Russia Hackers

The attack chain involves Turla exploiting their initial access to configure Microsoft Defender antivirus exclusions to evade detection and drop TinyTurla-NG, which is then persisted by creating a malicious “sdm” service that masquerades as a “System Device Manager” service.

TinyTurla-NG acts as a backdoor to conduct follow-on reconnaissance, exfiltrate files of interest to a command-and-control (C2) server, and deploy a custom-built version of the Chisel tunneling software. The exact intrusion pathway is still being investigated.

“Once the attackers have gained access to a new box, they will repeat their activities to create Microsoft Defender exclusions, drop the malware components, and create persistence,” Talos researchers said.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
http://www.indiavpn.org/2024/03/21/russia-hackers-using-tinyturla-ng-to-breach-european-ngos-systems/feed/ 0
New Backdoor Targeting European Officials Linked to Indian Diplomatic Events http://www.indiavpn.org/2024/02/29/new-backdoor-targeting-european-officials-linked-to-indian-diplomatic-events/ http://www.indiavpn.org/2024/02/29/new-backdoor-targeting-european-officials-linked-to-indian-diplomatic-events/#respond Thu, 29 Feb 2024 09:20:46 +0000 https://www.indiavpn.org/2024/02/29/new-backdoor-targeting-european-officials-linked-to-indian-diplomatic-events/ [ad_1]

Feb 29, 2024NewsroomCyber Espionage / Malware

Backdoor

A previously undocumented threat actor dubbed SPIKEDWINE has been observed targeting officials in European countries with Indian diplomatic missions using a new backdoor called WINELOADER.

The adversary, according to a report from Zscaler ThreatLabz, used a PDF file in emails that purported to come from the Ambassador of India, inviting diplomatic staff to a wine-tasting event on February 2, 2024.

Cybersecurity

The PDF document was uploaded to VirusTotal from Latvia on January 30, 2024. That said, there is evidence to suggest that this campaign may have been active at least since July 6, 2023, going by the discovery of another similar PDF file uploaded from the same country.

“The attack is characterized by its very low volume and the advanced tactics, techniques, and procedures (TTPs) employed in the malware and command-and-control (C2) infrastructure,” security researchers Sudeep Singh and Roy Tay said.

Backdoor

Central to the novel attack is the PDF file that comes embedded with a malicious link that masquerades as a questionnaire, urging the recipients to fill it out in order to participate. Clicking on the link paves the way for an HTML application (“wine.hta”) that contains obfuscated JavaScript code to retrieve an encoded ZIP archive bearing WINELOADER from the same domain.

The malware is packed with a core module that’s designed to Execute modules from the C2 server, inject itself into another dynamic-link library (DLL), and update the sleep interval between beacon requests.

Cybersecurity

A notable aspect of the cyber incursions is the use of compromised websites for C2 and hosting intermediate payloads. It’s suspected that the “C2 server only responds to specific types of requests at certain times,” thereby making the attacks more evasive.

“The threat actor put additional effort into remaining undetected by evading memory forensics and automated URL scanning solutions,” the researchers said.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
http://www.indiavpn.org/2024/02/29/new-backdoor-targeting-european-officials-linked-to-indian-diplomatic-events/feed/ 0