• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new cyber threat targets azerbaijan and israel diplomats, stealing sensitive

New Cyber Threat Targets Azerbaijan and Israel Diplomats, Stealing Sensitive Data

You are here: Home / General Cyber Security News / New Cyber Threat Targets Azerbaijan and Israel Diplomats, Stealing Sensitive Data
August 15, 2024

A previously unknown threat actor has been attributed to a spate of attacks targeting Azerbaijan and Israel with an aim to steal sensitive data.

The attack campaign, detected by NSFOCUS on July 1, 2024, leveraged spear-phishing emails to single out Azerbaijani and Israeli diplomats. The activity is being tracked under the moniker Actor240524.

“Actor240524 possesses the ability to steal secrets and modify file data, using a variety of countermeasures to avoid overexposure of attack tactics and techniques,” the cybersecurity company said in an analysis published last week.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

The attack chains commence with the use of phishing emails bearing Microsoft Word documents that, upon opening, urge the recipients to “Enable Content” and run a malicious macro responsible for executing an intermediate loader payload codenamed ABCloader (“MicrosoftWordUpdater.log”).

In the next step, ABCloader acts as a conduit to decrypt and load a DLL malware called ABCsync (“synchronize.dll”), which then establishes contact with a remote server (“185.23.253[.]143”) to receive and run commands.

Azerbaijan and Israel Diplomats

“Its main function is to determine the running environment, decrypt the program, and load the subsequent DLL (ABCsync),” NSFOCUS said. “It then performs various anti-sandbox and anti-analysis techniques for environmental detection.”

Some of the prominent functions of ABCsync are to execute remote shells, run commands using cmd.exe, and exfiltrate system information and other data.

Both ABCloader and ABCsync have been observed employing techniques like string encryption to cloak important file paths, file names, keys, error messages, and command-and-control (C2) addresses. They also carry out several checks to determine if the processes are being debugged or executed in a virtual machine or sandbox by validating the display resolution.

Cybersecurity

Another crucial step taken by Actor240524 is that it inspects if the number of processes running in the compromised system is less than 200, and if so, it exits the malicious process.

ABCloader is also designed to launch a similar loader called “synchronize.exe” and a DLL file named “vcruntime190.dll” or “vcruntime220.dll,” which are capable of setting up persistence on the host.

“Azerbaijan and Israel are allied countries with close economic and political exchanges,” NSFOCUS said. “Actor240524’s operation this time is likely aimed at the cooperative relationship between the two countries, targeting phishing attacks on diplomatic personnel of both countries.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «new gafgyt botnet variant targets weak ssh passwords for gpu New Gafgyt Botnet Variant Targets Weak SSH Passwords for GPU Crypto Mining
Next Post: GitHub Vulnerability ‘ArtiPACKED’ Exposes Repositories to Potential Takeover github vulnerability 'artipacked' exposes repositories to potential takeover»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels
  • Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
  • Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets
  • Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns
  • Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign
  • Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts
  • Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data
  • Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain
  • When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security
  • Operation Endgame Dismantles Rhadamanthys, Venom RAT, and Elysium Botnet in Global Crackdown

Copyright © TheCyberSecurity.News, All Rights Reserved.