• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hydrochasma: new threat actor targets shipping companies and medical labs

Hydrochasma: New Threat Actor Targets Shipping Companies and Medical Labs in Asia

You are here: Home / General Cyber Security News / Hydrochasma: New Threat Actor Targets Shipping Companies and Medical Labs in Asia
February 22, 2023

Shipping firms and health care laboratories in Asia have been the subject of a suspected espionage campaign carried out by a in no way-prior to-seen threat actor dubbed Hydrochasma.

The action, which has been ongoing considering that October 2022, “relies solely on publicly readily available and dwelling-off-the-land instruments,” Symantec, by Broadcom Software package, explained in a report shared with The Hacker Information.

There is no evidence readily available as yet to figure out its origin or affiliation with regarded threat actors, but the cybersecurity enterprise stated the team could be obtaining an interest in sector verticals that are involved in COVID-19-similar treatment options or vaccines.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The standout facets of the marketing campaign is the absence of information exfiltration and custom malware, with the danger actor employing open up resource tools for intelligence collecting. By making use of already offered applications, the intention, it appears, is to not only confuse attribution endeavours. but also to make the attacks stealthier.

The begin of the infection chain is most likely a phishing information made up of a resume-themed entice document that, when introduced, grants initial entry to the machine.

From there, the attackers have been noticed deploying a trove of tools like Speedy Reverse Proxy (FRP), Meterpreter, Cobalt Strike Beacon, Fscan, BrowserGhost, and Gost proxy.

“The tools deployed by Hydrochasma suggest a motivation to realize persistent and stealthy obtain to sufferer devices, as perfectly as an energy to escalate privileges and distribute laterally across victim networks,” the researchers mentioned.

The abuse of FRP by hacking groups is perfectly-documented. In October 2021, Optimistic Systems disclosed attacks mounted by ChamelGang that associated using the resource to management compromised hosts.

Then previous September, AhnLab Security Emergency response Centre (ASEC) uncovered attacks focusing on South Korean providers that leveraged FRP to establish remote obtain from presently compromised servers in buy to conceal the adversary’s origins.

Hydrochasma is not the only danger actor in modern months to completely eschew bespoke malware. This incorporates a cybercrime group dubbed OPERA1ER (aka Bluebottle) that will make in depth use of living-off-the-land, twin use equipment and commodity malware in intrusions aimed at Francophone countries in Africa.

Uncovered this report intriguing? Stick to us on Twitter  and LinkedIn to examine more unique content material we publish.


Some pieces of this article are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Putin Speech Interrupted by DDoS Attack
Next Post: 3 Steps to Automate Your Third-Party Risk Management Program 3 steps to automate your third party risk management program»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month
  • Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks
  • New “Brash” Exploit Crashes Chromium Browsers Instantly with a Single Malicious URL

Copyright © TheCyberSecurity.News, All Rights Reserved.