• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers uncover covert attack campaign targeting military contractors

Researchers Uncover Covert Attack Campaign Targeting Military Contractors

You are here: Home / General Cyber Security News / Researchers Uncover Covert Attack Campaign Targeting Military Contractors
September 29, 2022

A new covert attack campaign singled out various military services and weapons contractor providers with spear-phishing e-mail to induce a multi-phase an infection approach made to deploy an unfamiliar payload on compromised devices.

The really-qualified intrusions, dubbed STEEP#MAVERICK by Securonix, also targeted a strategic supplier to the F-35 Lightning II fighter aircraft.

“The attack was carried out commencing in late summer time 2022 concentrating on at minimum two large-profile army contractor companies,” Den Iuzvyk, Tim Peck, and Oleg Kolesnikov reported in an assessment.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


CyberSecurity

Infection chains start off with a phishing mail with a ZIP archive attachment that contains a shortcut file that promises to be a PDF doc about “Organization & Rewards,” which is then employed to retrieve a stager — an first binary which is utilized to down load the preferred malware — from a remote server.

This PowerShell stager sets the stage for a “robust chain of stagers” that progresses by way of seven far more actions, when the remaining PowerShell script executes a distant payload “header.png” hosted on a server named “terma[.]application.”

Malware Attack Targeting Military Contractors

“When we have been capable to download and evaluate the header.png file, we were not in a position to decode it as we believe that the marketing campaign was concluded and our principle is that the file was replaced in buy to reduce even more evaluation,” the researchers discussed.

“Our tries to decode the payload would only create garbage facts.”

What is actually notable about the modus operandi is the incorporation of obfuscated code built to thwart investigation, in addition to scanning for the existence of debugging application and halt the execution if the process language is set to Chinese or Russian.

The malware is also created to verify the amount of money of actual physical memory, and when again terminate itself if it can be less than 4GB. Also involved is a verify for virtualization infrastructure to decide if the malware is currently being executed in an evaluation natural environment or sandbox.

CyberSecurity

But if this exam fails, somewhat than merely quitting the execution, the malware disables system network adapters, reconfigures Windows Firewall to block all inbound and outbound website traffic, recursively deletes knowledge in all drives, and shuts down the pc.

Need to all these checks move, the PowerShell stager proceeds to disable logging, insert Windows Defender exclusions for LNK, RAR, and EXE files, and establish persistence via a scheduled process or Windows Registry modifications.

“General, it is distinct that this attack was relatively innovative with the malicious menace actor paying precise attention to opsec,” the scientists pointed out. “Whilst this was a extremely targeted attack, the tactics and tactics utilized are nicely identified and it is essential to stay vigilant.”

Located this write-up attention-grabbing? Comply with THN on Fb, Twitter  and LinkedIn to go through additional distinctive content we post.


Some areas of this short article are sourced from:
thehackernews.com

Previous Post: «five steps to mitigate the risk of credential exposure Five Steps to Mitigate the Risk of Credential Exposure
Next Post: Cloud and cyber security certifications remain highest paying for IT professionals cloud and cyber security certifications remain highest paying for it»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.