• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
iranian hackers using new spying malware that abuses telegram messenger

Iranian Hackers Using New Spying Malware That Abuses Telegram Messenger API

You are here: Home / General Cyber Security News / Iranian Hackers Using New Spying Malware That Abuses Telegram Messenger API
February 28, 2022

An Iranian geopolitical nexus threat actor has been uncovered deploying two new qualified malware that appear with “simple” backdoor functionalities as portion of an intrusion versus an unnamed Middle East authorities entity in November 2021.

Cybersecurity organization Mandiant attributed the attack to an uncategorized cluster it is really tracking below the moniker UNC3313, which it assesses with “reasonable self-confidence” as affiliated with the MuddyWater condition-sponsored group.

“UNC3313 conducts surveillance and collects strategic information to assistance Iranian pursuits and decision-creating,” scientists Ryan Tomcik, Emiel Haeghebaert, and Tufail Ahmed stated. “Targeting designs and linked lures exhibit a sturdy focus on targets with a geopolitical nexus.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper take secure and enxrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized seller: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Automatic GitHub Backups

In mid-January 2022, U.S. intelligence companies characterised MuddyWater (aka Static Kitten, Seedworm, TEMP.Zagros, or Mercury) as a subordinate ingredient of the Iranian Ministry of Intelligence and Security (MOIS) that has been energetic considering the fact that at the very least 2018 and is known to use a vast assortment of applications and techniques in its functions.

The attacks are mentioned to have been orchestrated through spear-phishing messages to gain original entry, adopted by getting gain of publicly out there offensive security resources and distant obtain software program for lateral motion and preserving accessibility to the setting.

The phishing e-mails have been crafted with a task promotion entice and deceived several victims to click a URL to down load a RAR archive file hosted on OneHub, which paved the way for the installation of ScreenConnect, a respectable distant obtain application for getting a foothold.

Prevent Data Breaches

“UNC3313 moved swiftly to create distant obtain by employing ScreenConnect to infiltrate units inside an hour of original compromise,” the scientists noted, incorporating the security incident was quickly contained and remediated.

Subsequent phases of the attack associated escalating privileges, carrying out inside reconnaissance on the qualified network, and running obfuscated PowerShell instructions to obtain additional applications and payloads on distant programs.

Also observed was a beforehand undocumented backdoor referred to as STARWHALE, a Windows Script File (.WSF) that executes instructions received commands from a hardcoded command-and-control (C2) server via HTTP.

An additional implant shipped throughout the system of the attack is GRAMDOOR, so named owing to its use of the Telegram API for its network communications with the attacker-managed server in a bid to evade detection, the moment all over again highlighting the use of interaction tools for facilitating exfiltration of info.

The conclusions also coincide with a new joint advisory from cybersecurity companies from the U.K. and the U.S., accusing the MuddyWater team of espionage attacks targeting the protection, community govt, oil and all-natural gasoline and telecommunications sectors across the globe.

Observed this article fascinating? Abide by THN on Fb, Twitter  and LinkedIn to study much more distinctive written content we write-up.


Some sections of this article are sourced from:
thehackernews.com

Previous Post: «social media hijacking malware spreading through gaming apps on microsoft Social Media Hijacking Malware Spreading Through Gaming Apps on Microsoft Store
Next Post: Experts Create Apple AirTag Clone That Can Bypass Anti-Tracking Measures experts create apple airtag clone that can bypass anti tracking measures»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Cyclops Blink Malware Expands to Target Asus
  • Aircraft Disrupted by Satellite Jamming Following Russian Invasion
  • Cloud-Based Email Threats Surge 50% in 2021
  • Google Uncovers ‘Initial Access Broker’ Working with Conti Ransomware Gang
  • New Variant of Russian Cyclops Blink Botnet Targeting ASUS Routers
  • Dev Sabotages Popular NPM Package to Protest Russian Invasion
  • Phishers Using Ukraine Invasion to Solicit Cryptocurrency
  • Hackers spotted using CAPTCHAs to dodge email security scanners
  • FBI Launches Virtual Assets Unit
  • The Total Economic Impact™ of IBM Security MaaS360 with Watson

Copyright © TheCyberSecurity.News, All Rights Reserved.