• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
iranian hackers using new spying malware that abuses telegram messenger

Iranian Hackers Using New Spying Malware That Abuses Telegram Messenger API

You are here: Home / General Cyber Security News / Iranian Hackers Using New Spying Malware That Abuses Telegram Messenger API
February 28, 2022

An Iranian geopolitical nexus threat actor has been uncovered deploying two new targeted malware that come with “simple” backdoor functionalities as part of an intrusion against an unnamed Middle East government entity in November 2021.

Cybersecurity company Mandiant attributed the attack to an uncategorized cluster it’s tracking under the moniker UNC3313, which it assesses with “moderate confidence” as associated with the MuddyWater state-sponsored group.

“UNC3313 conducts surveillance and collects strategic information to support Iranian interests and decision-making,” researchers Ryan Tomcik, Emiel Haeghebaert, and Tufail Ahmed said. “Targeting patterns and related lures demonstrate a strong focus on targets with a geopolitical nexus.”

✔ Approved Seller From Our Partners
Malwarebytes Premium 2022

Protect yourself against all threads using Malwarebytes. Get Malwarebytes Premium with 60% discount from a Malwarebytes official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Automatic GitHub Backups

In mid-January 2022, U.S. intelligence agencies characterized MuddyWater (aka Static Kitten, Seedworm, TEMP.Zagros, or Mercury) as a subordinate element of the Iranian Ministry of Intelligence and Security (MOIS) that has been active since at least 2018 and is known to use a wide range of tools and techniques in its operations.

The attacks are said to have been orchestrated via spear-phishing messages to gain initial access, followed by taking advantage of publicly available offensive security tools and remote access software for lateral movement and maintaining access to the environment.

The phishing emails were crafted with a job promotion lure and deceived multiple victims to click a URL to download a RAR archive file hosted on OneHub, which paved the way for the installation of ScreenConnect, a legitimate remote access software for gaining a foothold.

Prevent Data Breaches

“UNC3313 moved rapidly to establish remote access by using ScreenConnect to infiltrate systems within an hour of initial compromise,” the researchers noted, adding the security incident was quickly contained and remediated.

Subsequent phases of the attack involved escalating privileges, carrying out internal reconnaissance on the targeted network, and running obfuscated PowerShell commands to download additional tools and payloads on remote systems.

Also observed was a previously undocumented backdoor called STARWHALE, a Windows Script File (.WSF) that executes commands received commands from a hardcoded command-and-control (C2) server via HTTP.

Another implant delivered during the course of the attack is GRAMDOOR, so named owing to its use of the Telegram API for its network communications with the attacker-controlled server in a bid to evade detection, once again highlighting the use of communication tools for facilitating exfiltration of data.

The findings also coincide with a new joint advisory from cybersecurity agencies from the U.K. and the U.S., accusing the MuddyWater group of espionage attacks targeting the defense, local government, oil and natural gas and telecommunications sectors across the globe.

Found this article interesting? Follow THN on Facebook, Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «social media hijacking malware spreading through gaming apps on microsoft Social Media Hijacking Malware Spreading Through Gaming Apps on Microsoft Store
Next Post: Experts Create Apple AirTag Clone That Can Bypass Anti-Tracking Measures experts create apple airtag clone that can bypass anti tracking measures»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Google Uncovers ‘Initial Access Broker’ Working with Conti Ransomware Gang
  • New Variant of Russian Cyclops Blink Botnet Targeting ASUS Routers
  • Dev Sabotages Popular NPM Package to Protest Russian Invasion
  • Phishers Using Ukraine Invasion to Solicit Cryptocurrency
  • Hackers spotted using CAPTCHAs to dodge email security scanners
  • FBI Launches Virtual Assets Unit
  • The Total Economic Impact™ of IBM Security MaaS360 with Watson
  • Unified endpoint management solutions 2021-22
  • Misconfigured Firebase Databases Exposing Data in Mobile Apps
  • Six myths of SIEM

Copyright © TheCyberSecurity.News, All Rights Reserved.