• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
konni group using russian language malicious word docs in latest attacks

Konni Group Using Russian-Language Malicious Word Docs in Latest Attacks

You are here: Home / General Cyber Security News / Konni Group Using Russian-Language Malicious Word Docs in Latest Attacks
November 23, 2023

A new phishing attack has been noticed leveraging a Russian-language Microsoft Term document to produce malware able of harvesting delicate information and facts from compromised Windows hosts.

The exercise has been attributed to a threat actor referred to as Konni, which is assessed to share overlaps with a North Korean cluster tracked as Kimsuky (aka APT43).

“This marketing campaign depends on a distant entry trojan (RAT) able of extracting data and executing commands on compromised products,” Fortinet FortiGuard Labs researcher Cara Lin said in an investigation revealed this week.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The cyber espionage group is notable for its targeting of Russia, with the modus operandi involving the use of spear-phishing e-mail and malicious files as entry points for their attacks.

Cybersecurity

New attacks documented by Knowsec and ThreatMon have leveraged the WinRAR vulnerability (CVE-2023-38831) as effectively as obfuscated Visible Essential scripts to drop Konni RAT and a Windows Batch script able of accumulating knowledge from the contaminated equipment.

“Konni’s principal targets include details exfiltration and conducting espionage routines,” ThreatMon explained. “To reach these goals, the group employs a extensive array of malware and instruments, frequently adapting their practices to steer clear of detection and attribution.”

The most current attack sequence observed by Fortinet will involve a macro-laced Term doc that, when enabled, displays an report in Russian which is purportedly about “Western Assessments of the Development of the Special Military services Procedure.”

The Visual Essential for Software (VBA) macro subsequently proceeds to start an interim Batch script that performs program checks, User Account Handle (UAC) bypass, and in the end paves the way for the deployment of a DLL file that incorporates information gathering and exfiltration abilities.

“The payload incorporates a UAC bypass and encrypted interaction with a C2 server, enabling the risk actor to execute privileged commands,” Lin said.

Cybersecurity

Konni is much from the only North Korean menace actor to one out Russia. Proof gathered by Kaspersky, Microsoft, and SentinelOne exhibits that the adversarial collective referred to as ScarCruft (aka APT37) has also qualified trading corporations and missile engineering firms found in the place.

The disclosure also comes significantly less than two months following Solar, the cybersecurity arm of Russian point out-owned telecom business Rostelecom, disclosed that danger actors from Asia – principally those from China and North Korea – accounted for a the vast majority of attacks from the country’s infrastructure.

“The North Korean Lazarus team is also really active on the territory of the Russian Federation,” the enterprise reported. “As of early November, Lazarus hackers nevertheless have obtain to a variety of Russian programs.”

Discovered this write-up attention-grabbing? Comply with us on Twitter  and LinkedIn to browse a lot more exclusive written content we post.


Some parts of this report are sourced from:
thehackernews.com

Previous Post: «alert: new wailingcrab malware loader spreading via shipping themed emails Alert: New WailingCrab Malware Loader Spreading via Shipping-Themed Emails
Next Post: Kubernetes Secrets of Fortune 500 Companies Exposed in Public Repositories kubernetes secrets of fortune 500 companies exposed in public repositories»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk
  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Copyright © TheCyberSecurity.News, All Rights Reserved.