• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Bitter APT Hackers Continue to Target Bangladesh Military Entities

You are here: Home / General Cyber Security News / Bitter APT Hackers Continue to Target Bangladesh Military Entities
July 6, 2022

Bitter APT Hacker Group

Navy entities situated in Bangladesh continue to be at the getting conclusion of sustained cyberattacks by an highly developed persistent risk tracked as Bitter.

“By way of malicious document data files and intermediate malware stages the danger actors perform espionage by deploying Remote Access Trojans,” cybersecurity agency SECUINFRA claimed in a new create-up published on July 5.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The findings from the Berlin-headquartered organization establish on a past report from Cisco Talos in Might, which disclosed the group’s enlargement in concentrating on to strike Bangladeshi federal government organizations with a backdoor known as ZxxZ.

Bitter, also tracked beneath the codenames APT-C-08 and T-APT-17, is stated to be lively considering that at the very least late 2013 and has a track document of focusing on China, Pakistan, and Saudi Arabia applying unique applications this sort of as BitterRAT and ArtraDownloader.

The most recent attack chain specific by SECUINFRA is thought to have been performed in mid-May possibly 2022, originating with a weaponized Excel doc probable distributed by implies of a spear-phishing email that, when opened, exploits the Microsoft Equation Editor exploit (CVE-2018-0798) to fall the subsequent-stage binary from a remote server.

ZxxZ (or MuuyDownloader by the Qi-Anxin Risk Intelligence Center), as the downloaded payload is termed, is carried out in Visual C++ and features as a second-phase implant that will allow the adversary to deploy supplemental malware.

CyberSecurity

The most notable change in the malware is that it has dropped employing “ZxxZ” as the separator made use of when sending information again to the command-and-control (C2) server in favor of an underscore, suggesting that the group is actively creating modifications to its supply code to remain less than the radar.

Also put to use by the menace actor in its campaigns is a backdoor dubbed Almond RAT, a .NET-based mostly RAT that to start with arrived to light in May 2022 and provides simple facts accumulating features and the capacity to execute arbitrary instructions. In addition, the implant employs obfuscation and string encryption strategies to evade detection and to hinder investigation.

“Almond RATs main applications appear to be to be file method discovery, facts exfiltration and a way to load much more resources/set up persistence,” the scientists said. “The layout of the applications seems to be laid out in a way that it can be quickly modified and adapted to the present-day attack situation.”

Uncovered this write-up attention-grabbing? Adhere to THN on Fb, Twitter  and LinkedIn to browse far more exclusive material we post.


Some parts of this write-up are sourced from:
thehackernews.com

Previous Post: «russia linked state sponsored hackers launch fresh attacks by abusing latest red Russia-linked state-sponsored hackers launch fresh attacks by abusing latest red team tool
Next Post: Google Patches Chrome Zero Day Under Attack Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New Variant of Banking Trojan BBTok Targets Over 40 Latin American Banks
  • How to Interpret the 2023 MITRE ATT&CK Evaluation Results
  • Iranian Nation-State Actor OilRig Targets Israeli Organizations
  • High-Severity Flaws Uncovered in Atlassian Products and ISC BIND Server
  • Apple Rushes to Patch 3 New Zero-Day Flaws: iOS, macOS, Safari, and More Vulnerable
  • Mysterious ‘Sandman’ Threat Actor Targets Telecom Providers Across Three Continents
  • Researchers Raise Red Flag on P2PInfect Malware with 600x Activity Surge
  • The Rise of the Malicious App
  • China Accuses U.S. of Decade-Long Cyber Espionage Campaign Against Huawei Servers
  • Cyber Group ‘Gold Melody’ Selling Compromised Access to Ransomware Attackers

Copyright © TheCyberSecurity.News, All Rights Reserved.