• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new phishing campaign targets oil & gas with evolved data stealing

New Phishing Campaign Targets Oil & Gas with Evolved Data-Stealing Malware

You are here: Home / General Cyber Security News / New Phishing Campaign Targets Oil & Gas with Evolved Data-Stealing Malware
April 4, 2024

An up-to-date version of an details-stealing malware called Rhadamanthys is being utilized in phishing strategies targeting the oil and gas sector.

“The phishing emails use a exclusive auto incident entice and, in later levels of the an infection chain, spoof the Federal Bureau of Transportation in a PDF that mentions a considerable fine for the incident,” Cofense researcher Dylan Duncan mentioned.

The email message will come with a destructive website link that leverages an open up redirect flaw to take the recipients to a backlink hosting a supposed PDF doc, but, in truth, is an image that, upon clicking, downloads a ZIP archive with the stealer payload.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Written in C++, Rhadamanthys is designed to set up connections with a command-and-handle (C2) server in purchase to harvest sensitive facts from the compromised hosts.

Cybersecurity

“This campaign appeared within just times of the legislation enforcement takedown of the LockBit ransomware group,” Duncan claimed. “Even though this could be a coincidence, Craze Micro disclosed in August 2023 a Rhadamanthys variant that came bundled with a leaked LockBit payload, along with a clipper malware and cryptocurrency miner.

Phishing Campaign

“The menace actors included a blend of an data stealer and a LockBit ransomware variant in a single Rhadamanthys bundle, potentially indicating the continued evolution of the malware,” the corporation mentioned.

The improvement comes amid a continuous stream of new stealer malware family members like Sync-Scheduler and Mighty Stealer, even as present strains like StrelaStealer are evolving with improved obfuscation and anti-analysis procedures.

Phishing Campaign

It also follows the emergence of a malspam marketing campaign concentrating on Indonesia that employs banking-linked lures to propagate the Agent Tesla malware to plunder sensitive details these as login qualifications, money knowledge, and personal files.

Agent Tesla phishing strategies observed in November 2023 have also established their sights on Australia and the U.S., in accordance to Verify Level, which attributed the operations to two African-origin menace actors tracked as Bignosa (aka Nosakhare Godson and Andrei Ivan) and Gods (aka GODINHO or Kmarshal or Kingsley Fredrick), the latter of whom functions as a web designer.

Cybersecurity

“The principal actor [Bignosa] appears to be a section of a team functioning malware and phishing campaigns, targeting corporations, which is testified by the US and Australian email company databases, as nicely as men and women,” the Israeli cybersecurity firm stated.

The Agent Tesla malware distributed by way of these attack chains have been observed to be secured by the Cassandra Protector, which allows guard computer software systems versus reverse-engineering or modification endeavours. The messages are sent by way of an open up-supply webmail instrument known as RoundCube.

“As found from the description of these danger actors’ steps, no rocket science diploma is required to conduct the cyber crime functions powering one particular of the most common malware households in the last numerous a long time,” Check Position reported.

“It really is an unfortunate program of gatherings brought on by the small-entry degree threshold so that everyone eager to provoke victims to launch the malware by means of spam strategies can do so.”

Observed this short article intriguing? Adhere to us on Twitter  and LinkedIn to read additional unique articles we post.


Some areas of this report are sourced from:
thehackernews.com

Previous Post: «considerations for operational technology cybersecurity Considerations for Operational Technology Cybersecurity
Next Post: Vietnam-Based Hackers Steal Financial Data Across Asia with Malware vietnam based hackers steal financial data across asia with malware»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.