• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new apt group "cloudsorcerer" targets russian government entities

New APT Group “CloudSorcerer” Targets Russian Government Entities

You are here: Home / General Cyber Security News / New APT Group “CloudSorcerer” Targets Russian Government Entities
July 8, 2024

A formerly undocumented highly developed persistent danger (APT) team dubbed CloudSorcerer has been observed concentrating on Russian governing administration entities by leveraging cloud products and services for command-and-control (C2) and facts exfiltration.

Cybersecurity organization Kaspersky, which discovered the exercise in Might 2024, the tradecraft adopted by the danger actor bears similarities with that of CloudWizard, but pointed out the variations in the malware resource code. The attacks wield an modern data-collecting plan and a slew of evasion techniques for masking its tracks.

“It is a innovative cyber espionage resource applied for stealth monitoring, details assortment, and exfiltration by way of Microsoft Graph, Yandex Cloud, and Dropbox cloud infrastructure,” the Russian security seller mentioned.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

“The malware leverages cloud resources as its command and management (C2) servers, accessing them by means of APIs employing authentication tokens. Furthermore, CloudSorcerer utilizes GitHub as its initial C2 server.”

The exact strategy used to infiltrate targets is at this time unidentified, but the first access is exploited to fall a C-dependent transportable executable binary which is utilised as a backdoor, initiate C2 communications, or inject shellcode into other authentic procedures based on the process in which it is executed – particularly mspaint.exe, msiexec.exe, or incorporates the string “browser.”

“The malware’s capacity to dynamically adapt its behavior based on the course of action it is working in, coupled with its use of intricate inter-approach communication as a result of Windows pipes, further highlights its sophistication,” Kaspersky noted.

The backdoor ingredient is created to collect details about the sufferer device and retrieve directions to enumerate files and folders, execute shell commands, perform file functions, and operate added payloads.

Cybersecurity

The C2 module, for its portion, connects to a GitHub website page that functions as a useless drop resolver to fetch an encoded hex string pointing to the real server hosted on Microsoft Graph or Yandex Cloud.

“Alternatively, instead of connecting to GitHub, CloudSorcerer also attempts to get the identical data from hxxps://my.mail[.]ru/, which is a Russian cloud-based mostly photograph hosting server,” Kaspersky explained. “The name of the photo album incorporates the similar hex string.”

“The CloudSorcerer malware signifies a advanced toolset targeting Russian authorities entities. Its use of cloud products and services these types of as Microsoft Graph, Yandex Cloud, and Dropbox for C2 infrastructure, together with GitHub for initial C2 communications, demonstrates a well-planned strategy to cyber espionage.”

Identified this article fascinating? Follow us on Twitter  and LinkedIn to read through more exceptional content we article.


Some areas of this short article are sourced from:
thehackernews.com

Previous Post: «dark web malware logs expose 3,300 users linked to child Dark Web Malware Logs Expose 3,300 Users Linked to Child Abuse Sites
Next Post: Trojanized jQuery Packages Found on npm, GitHub, and jsDelivr Code Repositories trojanized jquery packages found on npm, github, and jsdelivr code»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.