• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Daggerfly APT Targets African Telecoms Firm With New MgBot Malware

You are here: Home / General Cyber Security News / Daggerfly APT Targets African Telecoms Firm With New MgBot Malware
April 20, 2023

The APT team acknowledged as Daggerfly (as perfectly as Evasive Panda and Bronze Highland) has been observed focusing on a telecommunications firm in Africa with new plugins developed with the MgBot malware framework.

A new advisory revealed currently by Symantec explained the results, declaring the destructive marketing campaign was initially noticed in November 2022 and is probable to continue to be ongoing.

“The attackers have been also noticed using a PlugX loader and abusing the legit AnyDesk distant desktop software package,” reads the advisory.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“Use of the MgBot modular malware framework and PlugX loader have been associated in the previous with China-connected APTs.”

Read more on the PlugX malware: Black Basta Deploys PlugX Malware in USB Devices With New Strategy

Symantec stated the group very first recognized the attack through AnyDesk connections uncovered on a Microsoft Trade mail server.

“The genuine, free of charge Soaring antivirus application was also applied to aspect-load the PlugX loader onto victim equipment,” the staff wrote.

Even more, Symantec explained the Daggerfly APT made use of the dwelling-off-the-land applications BITSAdmin and PowerShell to down load and install AnyDesk on the target device, together with the GetCredManCreds, a malware instrument created to extract stored qualifications from the Windows Credential Manager.

“They also dumped the SAM (Security Account Supervisor), System and Security hives of the Windows registry making use of the reg.exe resource. This permitted the adversaries to extract qualifications from the SAM databases,” Symantec wrote.

To assure persistence, Daggerfly danger actors then created a neighborhood account.

The plugins made and deployed by the risk actors making use of the MgBot framework had numerous data-collecting abilities, Symantec located.

These incorporated a network scanner, a Chrome and Firefox infostealer, a logging module, a QQ keylogger and messages infostealer, an Active Listing enumeration instrument, a password dumper, a display and clipboard grabber, an Outlook and Foxmail qualifications stealer, an audio seize tool, and a approach watchdog script.

“All of these capabilities would have allowed the attackers to acquire a sizeable amount of money of info from sufferer equipment,” Symantec stated. “The abilities of these plugins also clearly show that the principal target of the attackers throughout this campaign was information-collecting.”

Another threat actor specializing in data accumulating is YoroTrooper, a group a short while ago found by Cisco Talos.


Some elements of this post are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News ChatGPT-Related Malicious URLs on the Rise
Next Post: North Korean Hacker Suspected in 3CX Software Supply Chain Attack Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.