• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers expose space pirate' cyber campaign across russia and serbia

Researchers Expose Space Pirate’ Cyber Campaign Across Russia and Serbia

You are here: Home / General Cyber Security News / Researchers Expose Space Pirate’ Cyber Campaign Across Russia and Serbia
August 1, 2023

The threat actor acknowledged as Room Pirates has been linked to attacks towards at minimum 16 businesses in Russia and Serbia above the earlier 12 months by using novel ways and incorporating new cyber weapons to its arsenal.

“The cybercriminals’ major plans are nonetheless espionage and theft of confidential facts, but the group has expanded its passions and the geography of its attacks,” Favourable Technologies stated in a deep dive report published past week.

Targets comprise federal government organizations, instructional establishments, personal security providers, aerospace makers, agricultural producers, protection, strength, and healthcare companies in Russia and Serbia.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Place Pirates was initially uncovered by the Russian cybersecurity organization in Could 2022, highlighting its attacks on the aerospace sector in the nation. The team, mentioned to be active considering that at the very least late 2019, has backlinks to one more adversary tracked by Symantec as Webworm.

Cybersecurity

Constructive Technologies’ assessment of the attack infrastructure has uncovered the threat actor’s fascination in harvesting PST email archives as nicely as building use of Deed RAT, a malware artifact solely attributed to the adversarial collective.

Deed RAT is mentioned to be a successor to ShadowPad, which in alone is an evolution of PlugX, each of which are broadly made use of by Chinese cyber espionage crews. Below energetic advancement, the malware arrives in both of those 32- and 64-bit variations and is equipped to dynamically retrieve more plug-ins from a remote server.

This incorporates a Disk plug-in to enumerate files and folders, execute instructions, compose arbitrary documents to disk, and hook up to network drives and a Portmap module that’s used for port forwarding.

Deed RAT also functions as a conduit to provide following-phase payloads this sort of as Voidoor, a beforehand undocumented malware that is is made to get in touch with a legit forum identified as Voidtools and a GitHub repository linked with a person named “hasdhuahd” for command-and-command (C2).

Cybersecurity

Voidtools is the developer of a freeware desktop lookup utility for Microsoft Windows known as All the things, with its forum driven working with an open-resource discussion board software package called MyBB. The primary target of Voidoor is to login to the forum working with tough-coded qualifications and access the user’s individual messaging process to look for a folder matching a certain sufferer ID.

Proof exhibits that the accounts on GitHub and voidtools had been registered sometime in November 2022.

“The hackers are doing work on new malware that implements unconventional strategies, these as voidoor, and modifying their current malware,” Favourable Technologies claimed, adding the actors use a “huge variety of publicly readily available resources for navigating networks” and leverage the Acunetix web vulnerability scanner to “reconnoiter infrastructures it targets.”

Identified this write-up intriguing? Follow us on Twitter  and LinkedIn to read far more distinctive material we submit.


Some pieces of this post are sourced from:
thehackernews.com

Previous Post: «china's apt31 suspected in attacks on air gapped systems in eastern China’s APT31 Suspected in Attacks on Air-Gapped Systems in Eastern Europe
Next Post: What is Data Security Posture Management (DSPM)? what is data security posture management (dspm)?»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.