• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
iranian hackers using new spying malware that abuses telegram messenger

Iranian Hackers Using New Spying Malware That Abuses Telegram Messenger API

You are here: Home / General Cyber Security News / Iranian Hackers Using New Spying Malware That Abuses Telegram Messenger API
February 28, 2022

An Iranian geopolitical nexus threat actor has been uncovered deploying two new qualified malware that appear with “simple” backdoor functionalities as portion of an intrusion versus an unnamed Middle East authorities entity in November 2021.

Cybersecurity organization Mandiant attributed the attack to an uncategorized cluster it is really tracking below the moniker UNC3313, which it assesses with “reasonable self-confidence” as affiliated with the MuddyWater condition-sponsored group.

“UNC3313 conducts surveillance and collects strategic information to assistance Iranian pursuits and decision-creating,” scientists Ryan Tomcik, Emiel Haeghebaert, and Tufail Ahmed stated. “Targeting designs and linked lures exhibit a sturdy focus on targets with a geopolitical nexus.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Automatic GitHub Backups

In mid-January 2022, U.S. intelligence companies characterised MuddyWater (aka Static Kitten, Seedworm, TEMP.Zagros, or Mercury) as a subordinate ingredient of the Iranian Ministry of Intelligence and Security (MOIS) that has been energetic considering the fact that at the very least 2018 and is known to use a vast assortment of applications and techniques in its functions.

The attacks are mentioned to have been orchestrated through spear-phishing messages to gain original entry, adopted by getting gain of publicly out there offensive security resources and distant obtain software program for lateral motion and preserving accessibility to the setting.

The phishing e-mails have been crafted with a task promotion entice and deceived several victims to click a URL to down load a RAR archive file hosted on OneHub, which paved the way for the installation of ScreenConnect, a respectable distant obtain application for getting a foothold.

Prevent Data Breaches

“UNC3313 moved swiftly to create distant obtain by employing ScreenConnect to infiltrate units inside an hour of original compromise,” the scientists noted, incorporating the security incident was quickly contained and remediated.

Subsequent phases of the attack associated escalating privileges, carrying out inside reconnaissance on the qualified network, and running obfuscated PowerShell instructions to obtain additional applications and payloads on distant programs.

Also observed was a beforehand undocumented backdoor referred to as STARWHALE, a Windows Script File (.WSF) that executes instructions received commands from a hardcoded command-and-control (C2) server via HTTP.

An additional implant shipped throughout the system of the attack is GRAMDOOR, so named owing to its use of the Telegram API for its network communications with the attacker-managed server in a bid to evade detection, the moment all over again highlighting the use of interaction tools for facilitating exfiltration of info.

The conclusions also coincide with a new joint advisory from cybersecurity companies from the U.K. and the U.S., accusing the MuddyWater team of espionage attacks targeting the protection, community govt, oil and all-natural gasoline and telecommunications sectors across the globe.

Observed this article fascinating? Abide by THN on Fb, Twitter  and LinkedIn to study much more distinctive written content we write-up.


Some sections of this article are sourced from:
thehackernews.com

Previous Post: «social media hijacking malware spreading through gaming apps on microsoft Social Media Hijacking Malware Spreading Through Gaming Apps on Microsoft Store
Next Post: Experts Create Apple AirTag Clone That Can Bypass Anti-Tracking Measures experts create apple airtag clone that can bypass anti tracking measures»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.