• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers uncover new metador apt targeting telcos, isps, and universities

Researchers Uncover New Metador APT Targeting Telcos, ISPs, and Universities

You are here: Home / General Cyber Security News / Researchers Uncover New Metador APT Targeting Telcos, ISPs, and Universities
September 23, 2022

A formerly undocumented risk actor of unknown origin has been linked to attacks concentrating on telecom, internet company vendors, and universities throughout multiple nations around the world in the Center East and Africa.

“The operators are highly aware of operations security, controlling diligently segmented infrastructure for each sufferer, and swiftly deploying intricate countermeasures in the existence of security methods,” researchers from SentinelOne mentioned in a new report.

CyberSecurity

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The cybersecurity agency codenamed the group Metador in reference to a string “I am meta” in 1 of their malware samples and simply because of Spanish-language responses from the command-and-management (C2) servers.

The menace actor is reported to have largely focused on the development of cross-platform malware in its pursuit of espionage aims. Other hallmarks of the marketing campaign are the constrained variety of intrusions and extensive-expression accessibility to targets.

This contains two distinct Windows malware platforms identified as metaMain and Mafalda that are expressly engineered to operate in-memory and elude detection. metaMain also acts as a conduit to deploy Mafalda, a versatile interactive implant supporting 67 instructions.

metaMain, for its part, is element-loaded on its very own, enabling the adversary to keep extensive-time period entry, log keystrokes, down load and upload arbitrary information, and execute shellcode.

In a sign that Mafalda is becoming actively preserved by its builders, the malware obtained aid for 13 new commands involving two variants compiled in April and December 2021, incorporating selections for credential theft, network reconnaissance, and file program manipulation.

CyberSecurity

Attack chains have even further associated an mysterious Linux malware that’s used to assemble info from the compromised setting and funnel it again to Mafalda. The entry vector utilized to aid the intrusions is mysterious as however.

What is actually a lot more, references in the interior command’s documentation for Mafalda propose a obvious separation of tasks concerning the builders and operators. Finally nevertheless, Metador’s attribution remains a “garbled mystery.”

“Moreover, the complex complexity of the malware and its energetic enhancement recommend a effectively-resourced group ready to purchase, keep and extend numerous frameworks,” scientists Juan Andres Guerrero-Saade, Amitai Ben Shushan Ehrlich, and Aleksandar Milenkoski noted.

Observed this post intriguing? Adhere to THN on Fb, Twitter  and LinkedIn to read through much more exclusive content material we post.


Some areas of this report are sourced from:
thehackernews.com

Previous Post: «github alerts users to active phishing campaign GitHub alerts users to active phishing campaign
Next Post: Details of Over 300,000 Russian Reservists Leaked, Anonymous Claims Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.