• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hydrochasma: new threat actor targets shipping companies and medical labs

Hydrochasma: New Threat Actor Targets Shipping Companies and Medical Labs in Asia

You are here: Home / General Cyber Security News / Hydrochasma: New Threat Actor Targets Shipping Companies and Medical Labs in Asia
February 22, 2023

Shipping firms and health care laboratories in Asia have been the subject of a suspected espionage campaign carried out by a in no way-prior to-seen threat actor dubbed Hydrochasma.

The action, which has been ongoing considering that October 2022, “relies solely on publicly readily available and dwelling-off-the-land instruments,” Symantec, by Broadcom Software package, explained in a report shared with The Hacker Information.

There is no evidence readily available as yet to figure out its origin or affiliation with regarded threat actors, but the cybersecurity enterprise stated the team could be obtaining an interest in sector verticals that are involved in COVID-19-similar treatment options or vaccines.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The standout facets of the marketing campaign is the absence of information exfiltration and custom malware, with the danger actor employing open up resource tools for intelligence collecting. By making use of already offered applications, the intention, it appears, is to not only confuse attribution endeavours. but also to make the attacks stealthier.

The begin of the infection chain is most likely a phishing information made up of a resume-themed entice document that, when introduced, grants initial entry to the machine.

From there, the attackers have been noticed deploying a trove of tools like Speedy Reverse Proxy (FRP), Meterpreter, Cobalt Strike Beacon, Fscan, BrowserGhost, and Gost proxy.

“The tools deployed by Hydrochasma suggest a motivation to realize persistent and stealthy obtain to sufferer devices, as perfectly as an energy to escalate privileges and distribute laterally across victim networks,” the researchers mentioned.

The abuse of FRP by hacking groups is perfectly-documented. In October 2021, Optimistic Systems disclosed attacks mounted by ChamelGang that associated using the resource to management compromised hosts.

Then previous September, AhnLab Security Emergency response Centre (ASEC) uncovered attacks focusing on South Korean providers that leveraged FRP to establish remote obtain from presently compromised servers in buy to conceal the adversary’s origins.

Hydrochasma is not the only danger actor in modern months to completely eschew bespoke malware. This incorporates a cybercrime group dubbed OPERA1ER (aka Bluebottle) that will make in depth use of living-off-the-land, twin use equipment and commodity malware in intrusions aimed at Francophone countries in Africa.

Uncovered this report intriguing? Stick to us on Twitter  and LinkedIn to examine more unique content material we publish.


Some pieces of this article are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Putin Speech Interrupted by DDoS Attack
Next Post: 3 Steps to Automate Your Third-Party Risk Management Program 3 steps to automate your third party risk management program»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet
  • Researchers Uncover Chinese Nation State Hackers’ Deceptive Attack Strategies
  • Fifth of Execs Admit Security Flaws Cost Them New Biz
  • Online Safety Bill: Why is Ofcom being thrown under the bus?

Copyright © TheCyberSecurity.News, All Rights Reserved.