• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
israeli entities targeted by cyberattack using donut and sliver frameworks

Israeli Entities Targeted by Cyberattack Using Donut and Sliver Frameworks

You are here: Home / General Cyber Security News / Israeli Entities Targeted by Cyberattack Using Donut and Sliver Frameworks
July 3, 2024

Cybersecurity scientists have learned an attack marketing campaign that targets various Israeli entities with publicly-out there frameworks like Donut and Sliver.

The campaign, thought to be really targeted in nature, “leverage concentrate on-specific infrastructure and custom WordPress web sites as a payload supply mechanism, but affect a selection of entities across unrelated verticals, and count on effectively-identified open-source malware,” HarfangLab mentioned in a report previous 7 days.

The French business is monitoring the activity below the title Supposed Grasshopper. It can be a reference to an attacker-controlled server (“auth.financial state-gov-il[.]com/Supposed_GRASSHOPPER.bin”), to which a first-phase downloader connects to.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


This downloader, created in Nim, is rudimentary and is tasked with downloading the 2nd-phase malware from the staging server. It truly is shipped by implies of a digital hard disk (VHD) file which is suspected to be propagated by using custom made WordPress web pages as portion of a generate-by obtain scheme.

Cybersecurity

The 2nd-phase payload retrieved from the server is Donut, a shellcode generation framework, which serves as a conduit for deploying an open up-supply Cobalt Strike different termed Sliver.

“The operators also put some notable endeavours in obtaining focused infrastructure and deploying a sensible WordPress website to supply payloads,” the scientists mentioned. “Over-all, this marketing campaign feels like it could realistically be the function of a smaller staff.”

Donut and Sliver Frameworks

The stop objective of the marketing campaign is at present unknown, although HarfangLab theorized that it could also be affiliated with a respectable penetration tests operation, a probability that raises its very own set of inquiries encompassing transparency and impersonating Israeli governing administration agencies.

The disclosure will come as the SonicWall Seize Labs menace exploration workforce in depth an an infection chain that employs booby-trapped Excel spreadsheets as a commencing issue to drop a trojan regarded as Orcinius.

“This is a multi-stage trojan that is applying Dropbox and Google Docs to download second-stage payloads and keep up to date,” the corporation claimed. “It has an obfuscated VBA macro that hooks into Windows to keep track of operating windows and keystrokes and makes persistence employing registry keys.”

Observed this article interesting? Observe us on Twitter  and LinkedIn to read through more exceptional content material we article.


Some elements of this posting are sourced from:
thehackernews.com

Previous Post: «south korean erp vendor's server hacked to spread xctdoor malware South Korean ERP Vendor’s Server Hacked to Spread Xctdoor Malware
Next Post: FakeBat Loader Malware Spreads Widely Through Drive-by Download Attacks fakebat loader malware spreads widely through drive by download attacks»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.