• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
goldenjackal: new threat group targeting middle eastern and south asian

GoldenJackal: New Threat Group Targeting Middle Eastern and South Asian Governments

You are here: Home / General Cyber Security News / GoldenJackal: New Threat Group Targeting Middle Eastern and South Asian Governments
May 23, 2023

Authorities and diplomatic entities in the Center East and South Asia are the concentrate on of a new sophisticated persistent menace actor named GoldenJackal.

Russian cybersecurity business Kaspersky, which has been preserving tabs on the group’s activities since mid-2020, characterised the adversary as each able and stealthy.

The concentrating on scope of the campaign is centered on Afghanistan, Azerbaijan, Iran, Iraq, Pakistan, and Turkey, infecting victims with tailored malware that steals knowledge, propagates throughout devices through removable drives, and conducts surveillance.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


GoldenJackal is suspected to have been energetic for at minimum four a long time, despite the fact that very little is regarded about the team. Kaspersky said it has been not able to decide its origin or affiliation with recognised danger actors, but the actor’s modus operandi implies an espionage drive.

What’s extra, the risk actor’s makes an attempt to manage a small profile and disappear into the shadows bears all the hallmarks of a condition-sponsored group.

That explained, some tactical overlaps have been noticed involving the danger actor and Turla, 1 of Russia’s elite nation-point out hacking crews. In a person stance, a sufferer device was contaminated by Turla and GoldenJackal two months apart.

The precise initial route utilized to breach specific computer systems is not known at this stage, but evidence gathered so significantly points to the use of trojanized Skype installers and destructive Microsoft Term paperwork.

While the installer serves as a conduit to supply a .NET-centered trojan named JackalControl, the Phrase data files have been noticed weaponizing the Follina vulnerability (CVE-2022-30190) to drop the exact same malware.

JackalControl, as the title implies, enables the attackers to remotely commandeer the machine, execute arbitrary instructions, as very well as upload and download from and to the program.

Geography of victimsGeography of victims

Some of the other malware people deployed by GoldenJackal are as follows –

  • JackalSteal – An implant that is made use of to locate information of curiosity, including those people positioned in detachable USB drives, and transmit them to a distant server.
  • JackalWorm – A worm that’s engineered to infect methods working with detachable USB drives and put in the JackalControl trojan.
  • JackalPerInfo – A malware that will come with capabilities to harvest program metadata, folder contents, put in applications, and jogging procedures, and qualifications saved in web browser databases.
  • JackalScreenWatcher – A utility to get screenshots centered on a preset time interval and ship them to an actor-controlled server.

An additional noteworthy element of the risk actor is its reliance on hacked WordPress sites as a relay to ahead web requests to the actual command-and-command (C2) server by indicates of a rogue PHP file injected into the internet sites.

“The group is probably making an attempt to lessen its visibility by limiting the quantity of victims,” Kaspersky researcher Giampaolo Dedola explained. “Their toolkit looks to be less than enhancement – the range of variants displays that they are nevertheless investing in it.”

Found this article appealing? Stick to us on Twitter  and LinkedIn to read more exclusive written content we publish.


Some parts of this posting are sourced from:
thehackernews.com

Previous Post: «north korean kimsuky hackers strike again with advanced reconnaissance malware North Korean Kimsuky Hackers Strike Again with Advanced Reconnaissance Malware
Next Post: GoldenJackal Targets Diplomatic Entities in Middle East, South Asia Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Enzo Biochem Hit by Ransomware, 2.5 Million Patients’ Data Compromised
  • US and Korean Agencies Issue Warning on North Korean Cyber-Attacks
  • Malicious PyPI Packages Use Compiled Python Code to Bypass Detection
  • New Botnet Malware ‘Horabot’ Targets Spanish-Speaking Users in Latin America
  • The Importance of Managing Your Data Security Posture
  • Camaro Dragon Strikes with New TinyNote Backdoor for Intelligence Gathering
  • Insurers Predict $33bn Bill for Catastrophic “Cyber Event”
  • Chinese Phishing Gang “PostalFurious” Expands Campaign
  • Kaspersky Says it is Being Targeted By Zero-Click Exploits
  • North Korea’s Kimsuky Group Mimics Key Figures in Targeted Cyber Attacks

Copyright © TheCyberSecurity.News, All Rights Reserved.