• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
russia linked state sponsored hackers launch fresh attacks by abusing latest red

Russia-linked state-sponsored hackers launch fresh attacks by abusing latest red team tool

You are here: Home / General Cyber Security News / Russia-linked state-sponsored hackers launch fresh attacks by abusing latest red team tool
July 6, 2022

Getty Visuals

Security researchers have identified hackers abusing the newest penetration screening resource in energetic attacks on international targets.

Unit 42 industry experts reported that a malicious payload affiliated with the Brute Ratel C4 (BRc4) red teaming tool goes undetected by numerous big security solutions and has been sued towards organisations in North and South The us.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The packaging of the destructive payload is reliable with the strategies deployed by superior persistent risk group 29 (APT29) – usually identified as ‘Cozy Bear’ – a Russian-linked point out-sponsored hacking group known for the infamous SolarWinds attack in 2020. 

The BRc4 instrument has been about due to the fact 2020 with India-based mostly security engineer Chetan Nayak, who beforehand worked for crimson teams at main western security vendors, lately commercialising the solution. 

Nayak has stated the pentesting tool was crafted soon after reverse-engineering various main security goods, though Unit 42 mentioned BRc4 is more recent but no much less able than the much more typically abused Cobalt Strike.

“Overall, we believe that this study is sizeable in that it identifies not only a new purple staff capacity that is mainly undetectable by most cyber security distributors, but extra importantly, a capability with a developing person foundation that we evaluate is now leveraging country-condition deployment tactics,” Unit 42 said.

“We really encourage all security sellers to create protections to detect action from this software and all organisations to be on alert for action from this instrument.”

Immediately after initial being uploaded to VirusTotal in Might 2022, the malicious payload slipped beneath the detection of 56 various security distributors that evaluated it, assigning it ‘benign’ status, Unit 42 explained, exhibiting how successful Nayak’s reverse engineering initiatives have been.

Technique of supply

The malicious file is packaged up as a self-contained, benign ISO file and incorporated in the ISO is the lure file – a Windows shortcut (LNK) file masquerading as a Phrase doc, comprehensive with a pretend word doc file icon, and seemingly staying a CV for a Roshan Bandara.

This is the real malicious file, hidden within the ISO which slipped through security vendors’ detections. It seems on a user’s challenging drive immediately after the ISO is double-clicked and mounted as a Windows drive. When the entice file is opened-clicked, BRc4 would be installed.

This file is normally despatched to victims via spear-phishing campaigns or downloaded to the victim by a next-phase downloader, Unit 42 mentioned.

“While we deficiency insight into how this certain payload was sent to a goal natural environment, we observed link makes an attempt to the C2 server originating from 3 Sri Lankan IP addresses concerning May well 19-20,” said the researchers.

In the exact same folder exactly where the entice file is saved, other archived .exe and .dll data files are existing but hidden to most Windows customers many thanks to the working system’s (OS) default configuration.

Flowchart showing the infection chain of BRc4

Unit 42

BRc4’s capabilities

When set up, BRc4 advertises by itself as owning a broad selection of capabilities. These ended up designed for reputable use in pink team-blue staff physical exercises, but like Cobalt Strike, the strong equipment are frequently abused by black hat hackers in destructive cyber attacks.

Some of the tool’s capabilities contain:

  • SMB and TCP payloads provide the functionality to compose personalized external C2 channels above authentic web sites such as Slack, Discord, Microsoft Groups, and far more
  • Ability to preserve memory artefacts concealed from EDRs and AV
  • Choose screenshots
  • x64 shellcode loader
  • Reflective and item file loader
  • Patching Anti Malware Scan Interface (AMSI)
  • Develop Windows program expert services
  • Add and download files

Unit 42 also explained the C2 infrastructure utilized by the threat actors abusing BRc4 is reliable with the strategies employed by APT29, utilizing popular cloud storage and collaboration platforms.

The sample analysed by the researchers uncovered the payload ‘calling home’ to an AWS-registered IP handle situated in the US about port 443. The X.509 certificate on the listening port was also self-signed and established up to impersonate a Microsoft security crew.

A Ukrainian IP handle was also used to administer the C2 infrastructure, and scientists considered that the attackers harnessed a household network for this.


Some sections of this article are sourced from:
www.itpro.co.uk

Previous Post: «Cyber Security News Software Supply Chain Attack Hits Thousands of Apps
Next Post: Bitter APT Hackers Continue to Target Bangladesh Military Entities Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.