• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
blacktech targets tech, research, and gov sectors new 'deuterbear' tool

BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool

You are here: Home / General Cyber Security News / BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
April 19, 2024

Technology, study, and federal government sectors in the Asia-Pacific region have been specific by a risk actor referred to as BlackTech as portion of a current cyber attack wave.

The intrusions pave the way for an updated model of modular backdoor dubbed Waterbear as effectively as its increased successor referred to as Deuterbear.

“Waterbear is recognized for its complexity, as it utilizes a selection of evasion mechanisms to minimize the chance of detection and analysis,” Development Micro researchers Cyris Tseng and Pierre Lee stated in an investigation very last week.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“In 2022, Earth Hundun began using the most up-to-date edition of Waterbear — also recognised as Deuterbear — which has a number of changes, together with anti-memory scanning and decryption routines, that make us look at it a diverse malware entity from the original Waterbear.”

Cybersecurity

The cybersecurity business is tracking the danger actor underneath the moniker Earth Hundun, which is acknowledged to be lively considering that at the very least 2007. It also goes by other names these as Circuit Panda, HUAPI, Manga Taurus, Palmerworm, Red Djinn, and Temp.Overboard.

In a joint advisory published very last September, cybersecurity and intelligence businesses from Japan and the U.S. attributed the adversary to China, describing its potential to modify router firmware and exploit routers’ area-have faith in interactions to pivot from global subsidiaries to their company headquarters based in the two nations.

“BlackTech actors use tailor made malware, twin-use resources, and dwelling-off-the-land strategies, these kinds of as disabling logging on routers, to conceal their operations,” the governments said.

Deuterbear malware

“Upon gaining an preliminary foothold into a goal network and getting administrator entry to network edge products, BlackTech cyber actors usually modify the firmware to cover their action throughout the edge equipment to additional retain persistence in the network.”

Just one of the critical equipment in its multifaceted arsenal is Waterbear (aka DBGPRINT), which has been set to use given that 2009 and has been continually updated above the several years with enhanced defense evasion attributes.

The core remote obtain trojan is fetched from a command-and-control (C2) server by means of a downloader, which is introduced applying a loader that, in switch, is executed by means of a identified technique called DLL aspect-loading.

The most recent version of the implant supports nearly 50 commands, enabling it to complete a large variety of pursuits, which includes process enumeration and termination, file operations, window management, start off and exit distant shell, screenshot seize, and Windows Registry modification, among the other individuals.

Cybersecurity

Also sent applying a very similar an infection circulation considering that 2022 is Deuterbear, whose downloader implements an array of obfuscation methods to resist anti-analysis and works by using HTTPS for C2 communications.

“Given that 2009, Earth Hundun has repeatedly advanced and refined the Waterbear backdoor, as nicely as its numerous variants and branches,” the researchers said.

“The Deuterbear downloader employs HTTPS encryption for network traffic defense and implements numerous updates in malware execution, this kind of as altering the purpose decryption, examining for debuggers or sandboxes, and modifying targeted traffic protocols.”

Found this short article attention-grabbing? Follow us on Twitter  and LinkedIn to browse more unique written content we write-up.


Some sections of this short article are sourced from:
thehackernews.com

Previous Post: «how attackers can own a business without touching the endpoint How Attackers Can Own a Business Without Touching the Endpoint
Next Post: Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks critical update: crushftp zero day flaw exploited in targeted attacks»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.