• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
microsoft warns of new 'falsefont' backdoor targeting the defense sector

Microsoft Warns of New ‘FalseFont’ Backdoor Targeting the Defense Sector

You are here: Home / General Cyber Security News / Microsoft Warns of New ‘FalseFont’ Backdoor Targeting the Defense Sector
December 22, 2023

Businesses in the Defense Industrial Foundation (DIB) sector are in the crosshairs of an Iranian risk actor as part of a campaign designed to provide a in no way-in advance of-seen backdoor called FalseFont.

The findings occur from Microsoft, which is tracking the activity less than its weather-themed moniker Peach Sandstorm (previously Holmium), which is also identified as APT33, Elfin, and Refined Kitten.

“FalseFont is a customized backdoor with a extensive range of functionalities that allow operators to remotely access an infected procedure, start additional data files, and ship details to its [command-and-control] servers,” the Microsoft Risk Intelligence workforce mentioned on X (earlier Twitter).

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Impending WEBINAR Beat AI-Powered Threats with Zero Have confidence in – Webinar for Security Specialists

Common security actions will not reduce it in present day world. It is time for Zero Have confidence in Security. Secure your knowledge like by no means right before.

Sign up for Now

The first recorded use of the implant was in early November 2023.

The tech huge even further explained that the latest development aligns with previous exercise from Peach Sandstorm and demonstrates a continued evolution of the threat actor’s tradecraft.

In a report released in September 2023, Microsoft connected the team to password spray attacks carried out in opposition to thousands of corporations globally concerning February and July 2023. The intrusions generally singled out satellite, defense, and pharmaceutical sectors.

The finish goal, the corporation stated, is to aid intelligence assortment in guidance of Iranian condition interests. Peach Sandstorm is believed to have been lively because at least 2013.

Cybersecurity

The disclosure will come as the Israel Nationwide Cyber Directorate (INCD) accused Iran and Hezbollah of making an attempt to unsuccessfully concentrate on Ziv Hospital by means of hacking crews named Agrius and Lebanese Cedar.

The agency also discovered particulars of a phishing campaign in which a bogus advisory for a security flaw in F5 Big-IP products and solutions is employed as a decoy to deliver wiper malware on Windows and Linux devices.

The lure for the focused attack is a critical authentication bypass vulnerability (CVE-2023-46747, CVSS score: 9.8) that arrived to light-weight in late October 2023. The scale of the marketing campaign is at the moment mysterious.

Located this article fascinating? Follow us on Twitter  and LinkedIn to go through additional distinctive content material we write-up.


Some components of this article are sourced from:
thehackernews.com

Previous Post: «experts detail multi million dollar licensing model of predator spyware Experts Detail Multi-Million Dollar Licensing Model of Predator Spyware
Next Post: UAC-0099 Using WinRAR Exploit to Target Ukrainian Firms with LONEPAGE Malware uac 0099 using winrar exploit to target ukrainian firms with lonepage»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.