• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
pakistani hackers use disgomoji malware in indian government cyber attacks

Pakistani Hackers Use DISGOMOJI Malware in Indian Government Cyber Attacks

You are here: Home / General Cyber Security News / Pakistani Hackers Use DISGOMOJI Malware in Indian Government Cyber Attacks
June 15, 2024

A suspected Pakistan-based threat actor has been linked to a cyber espionage campaign targeting Indian government entities in 2024.

Cybersecurity company Volexity is tracking the activity under the moniker UTA0137, noting the adversary’s exclusive use of a malware called DISGOMOJI that’s written in Golang and is designed to infect Linux systems.

“It is a modified version of the public project Discord-C2, which uses the messaging service Discord for command and control (C2), making use of emojis for its C2 communication,” it said.

โœ” Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCartยฎ (Limited Offer).

โžค Activate Your Coupon Code


It’s worth noting that DISGOMOJI is the same “all-in-one” espionage tool that BlackBerry said it discovered as part of an infrastructure analysis in connection with an attack campaign mounted by the Transparent Tribe actor, a Pakistan-nexus hacking crew

Cybersecurity

The attack chains commence with spear-phishing emails bearing a Golang ELF binary delivered within a ZIP archive file. The binary then downloads a benign lure document while also stealthily downloading the DISGOMOJI payload from a remote server.

A custom-fork of Discord-C2, DISGOMOJI is designed to capture host information and run commands received from an attacker-controlled Discord server. It also adopts the novel approach of sending and processing commands using different emojis –

  • ๐Ÿƒโ€โ™‚๏ธ – Execute a command on the victim’s device
  • ๐Ÿ“ธ – Capture a screenshot of the victim’s screen
  • ๐Ÿ‘‡ – Upload a file from the victim’s device to the channel
  • ๐Ÿ‘ˆ – Upload a file from the victim’s device to transfer[.]sh
  • โ˜๏ธ – Download a file to the victim’s device
  • ๐Ÿ‘‰ – Download a file hosted on oshi[.]at to the victim’s device
  • ๐Ÿ”ฅ – Find and exfiltrate files matching the following extensions: CSV, DOC, ISO, JPG, ODP, ODS, ODT, PDF, PPT, RAR, SQL, TAR, XLS, and ZIP
  • ๐ŸฆŠ – Gather all Mozilla Firefox profiles on the victim’s device into a ZIP archive
  • ๐Ÿ’€ – Terminate the malware process on the victim’s device
  • ๐Ÿ• – Inform the attacker that the command is being processed
  • โœ… – Inform the attacker that the command has completed execution

“The malware creates a dedicated channel for itself in the Discord server, meaning each channel in the server represents an individual victim,” Volexity said. “The attacker can then interact with every victim individually using these channels.”

DISGOMOJI Malware

The company said it unearthed different variations of DISGOMOJI with capabilities to establish persistence, prevent duplicate DISGOMOJI processes from running at the same time, dynamically fetch the credentials to connect to the Discord server at runtime rather than hard coding them, and deter analysis by displaying bogus informational and error messages.

Cybersecurity

UTA0137 has also been observed using legitimate and open-source tools like Nmap, Chisel, and Ligolo for network scanning and tunneling purposes, respectively, with one recent campaign also exploiting the DirtyPipe flaw (CVE-2022-0847) to achieve privilege escalation against Linux hosts.

Another post-exploitation tactic concerns the use of the Zenity utility to display a malicious dialog box that masquerades as a Firefox update in order to socially engineer users into giving up their passwords.

“The attacker successfully managed to infect a number of victims with their Golang malware, DISGOMOJI,” Volexity said. “UTA0137 has improved DISGOMOJI over time.”

Found this article interesting? Follow us on Twitter ๏‚™ and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «meta pauses ai training on eu user data amid privacy Meta Pauses AI Training on EU User Data Amid Privacy Concerns
Next Post: Grandoreiro Banking Trojan Hits Brazil as Smishing Scams Surge in Pakistan grandoreiro banking trojan hits brazil as smishing scams surge in»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • Your AI Agents Might Be Leaking Data โ€” Watch this Webinar to Learn How to Stop It
  • Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros
  • Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
  • Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams
  • Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets
  • The Hidden Weaknesses in AI SOC Tools that No One Talks About
  • Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms
  • Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials
  • North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.