• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
agent racoon backdoor targets organizations in middle east, africa, and

Agent Racoon Backdoor Targets Organizations in Middle East, Africa, and U.S.

You are here: Home / General Cyber Security News / Agent Racoon Backdoor Targets Organizations in Middle East, Africa, and U.S.
December 2, 2023

Businesses in the Center East, Africa, and the U.S. have been targeted by an mysterious menace actor to distribute a new backdoor known as Agent Racoon.

“This malware family is penned using the .NET framework and leverages the domain name services (DNS) protocol to build a covert channel and offer diverse backdoor functionalities,” Palo Alto Networks Device 42 researcher Chema Garcia said in a Friday investigation.

Targets of the attacks span various sectors these types of as training, true estate, retail, non-gains, telecom, and governments. The action has not been attributed to a acknowledged danger actor, even though it can be assessed to be a country-point out aligned owing to the victimology pattern and the detection and defense evasion strategies made use of.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

The cybersecurity company is tracking the cluster below the moniker CL-STA-0002. It is at this time not apparent how these organizations ended up breached, and when the attacks took spot.

Some of the other instruments deployed by the adversary incorporate a tailored variation of Mimikatz termed Mimilite as nicely as a new utility identified as Ntospy, which utilizes a custom made DLL module utilizing a network supplier to steal qualifications to a remote server.

“Whilst the attackers usually employed Ntospy throughout the afflicted companies, the Mimilite software and the Agent Racoon malware have only been found in nonprofit and government-relevant organizations’ environments,” Garcia described.

Agent Racoon

It can be well worth pointing out a formerly identified risk exercise cluster recognized as CL-STA-0043 has also been connected to the use of Ntospy, with the adversary also targeting two businesses that have been focused by CL-STA-0002.

Agent Raccoon, executed by indicates of scheduled responsibilities, enables for command execution, file uploading, and file downloading, even though disguising alone as Google Update and Microsoft OneDrive Updater binaries.

Cybersecurity

The command-and-control (C2) infrastructure used in link with the implant dates again to at minimum August 2020. An examination of VirusTotal submissions of the Agent Racoon artifacts reveals that the earliest sample was uploaded in July 2022.

Device 42 said it also uncovered evidence of successful details exfiltration from Microsoft Trade Server environments, ensuing in the theft of e-mails matching different lookup conditions. The threat actor has also been observed to harvest victims’ Roaming Profile.

“This instrument established is not nonetheless related with a specific menace actor, and not fully restricted to a one cluster or marketing campaign,” Garcia reported.

Uncovered this post fascinating? Abide by us on Twitter  and LinkedIn to read far more exceptional content material we publish.


Some parts of this write-up are sourced from:
thehackernews.com

Previous Post: «russian hacker vladimir dunaev convicted for creating trickbot malware Russian Hacker Vladimir Dunaev Convicted for Creating TrickBot Malware
Next Post: Microsoft Warns of Malvertising Scheme Spreading CACTUS Ransomware microsoft warns of malvertising scheme spreading cactus ransomware»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.