• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Dark Pink APT Group Deploys KamiKakaBot Against South Asian Entities

You are here: Home / General Cyber Security News / Dark Pink APT Group Deploys KamiKakaBot Against South Asian Entities
March 13, 2023

The menace actor acknowledged as Dark Pink has been involved with deployments of the KamiKakaBot malware versus several governing administration entities in ASEAN (Association of Southeast Asian Nations) international locations.

Menace researchers at EclecticIQ reviewed the conclusions in a weblog publish released last week, detailing the noticed attacks took spot in February.

“In this new marketing campaign, the romantic relationship concerning Europe and ASEAN nations is incredibly probable staying exploited in the sort of social engineering lures from armed service and authorities entities in Southeast Asian nations,” the report explained. 

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“Although scientists lack the conclusive evidence required to attribute the nationality of this team, the objectives of the attackers and some of the designs counsel that the Dark Pink group could quite possibly be a Chinese APT team.”

The team added that the malicious campaigns were almost identical to those previously uncovered by Team-IB.

“In January 2023, the danger actors utilized ISO visuals to provide KamiKakaBot, which was executed applying a DLL side-loading system,” reads the EclecticIQ write-up. “The primary variation in the February marketing campaign is that the malware’s obfuscation regime has enhanced to better evade anti-malware steps.”

Go through a lot more on that campaign here: New APT Dark Pink Hits Asia-Pacific, Europe With Spear Phishing Tactics

The KamiKakaBot malware, sent by means of phishing e-mail all through Dark Pink’s most up-to-date attacks, aims to steal qualifications, searching history and cookies from browsers like Chrome, Edge and Firefox. The malware also features distant code execution (RCE) capabilities.

“Developers of KamiKakaBot utilize a variety of evasion tactics to stay undetected whilst executing destructive steps on infected devices,” EclecticIQ wrote. “For instance, they use living-off-the-land binaries (LOLBINs) […] to run the KamiKakaBot malware on victims’ devices.”

They also utilized respectable web expert services as a Command and Regulate (C2) server, specially Telegram, to even more hide their malicious intentions.

To shield techniques from Dark Pink and related threats, EclecticIQ endorses businesses use secure DLL search manner, disable mounting ISO photographs by means of team plan and disable browser password conserving also through group plan, as nicely as deploy the highest stage of defense on firewalls and endpoints.

The company’s advisory will come weeks immediately after knowledge from Proofpoint advised phone attacks and multi-factor authentication (MFA) bypass approaches have been driving phishing attacks upward in 2022.


Some elements of this short article are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Infostealers Spread Via AI-Generated YouTube Videos
Next Post: Remote Code Execution and Camera Access Flaws Found in Smart Intercoms Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet
  • Researchers Uncover Chinese Nation State Hackers’ Deceptive Attack Strategies
  • Fifth of Execs Admit Security Flaws Cost Them New Biz
  • Online Safety Bill: Why is Ofcom being thrown under the bus?

Copyright © TheCyberSecurity.News, All Rights Reserved.