• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
russian government software backdoored to deploy konni rat malware

Russian Government Software Backdoored to Deploy Konni RAT Malware

You are here: Home / General Cyber Security News / Russian Government Software Backdoored to Deploy Konni RAT Malware
February 22, 2024

An installer for a resource possible applied by the Russian Consular Department of the Ministry of Overseas Affairs (MID) has been backdoored to deliver a distant entry trojan termed Konni RAT (aka UpDog).

The conclusions occur from German cybersecurity firm DCSO, which connected the exercise as originating from the Democratic People’s Republic of Korea (DPRK)-nexus actors targeting Russia.

The Konni (aka Opal Sleet, Osmium, or TA406) exercise cluster has an established pattern of deploying Konni RAT against Russian entities, with the danger actor also joined to attacks directed towards MID at the very least due to the fact Oct 2021.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


In November 2023, Fortinet FortiGuard Labs disclosed the use of Russian-language Microsoft Phrase files to provide malware capable of harvesting sensitive details from compromised Windows hosts.

Cybersecurity

DCSO mentioned the packaging of Konni RAT in application installers is a strategy earlier adopted by the group in October 2023, when it was identified to leverage a backdoored Russian tax submitting software program named Spravki BK to distribute the trojan.

“In this instance, the backdoored installer seems to be for a instrument named ‘Statistika KZU’ (Cтатистика КЗУ),” the Berlin-based organization said.

Konni RAT Malware

“On the foundation of install paths, file metadata, and consumer manuals bundled into the installer, […] the program is meant for internal use inside of the Russian Ministry of Overseas Affairs (MID), specifically for the relaying of yearly report data files from abroad consular posts (КЗУ — консульские загранучреждения) to the Consular Division of the MID by using a secure channel.”

The trojanized installer is an MSI file that, when released, initiates the infection sequence to establish get hold of with a command-and-manage (C2) server to await even further recommendations.

Konni RAT Malware

The remote access trojan, which comes with capabilities for file transfers and command execution, is believed to have been put to use as early as 2014, and has also been used by other North Korean threat actors recognized as Kimsuky and ScarCruft (aka APT37).

It really is at this time not obvious how the risk actors managed to receive the installer, offered that it can be not publicly obtainable. But it is really suspected that the long background of espionage functions targeting Russia may possibly have helped them discover potential tools for subsequent attacks.

Cybersecurity

While North Korea’s focusing on of Russia is not new, the growth arrives amid expanding geopolitical proximity among the two countries. Condition media from the Hermit Kingdom documented this week that Russian President Vladimir Putin has supplied chief Kim Jong Un a luxury Russian-created auto.

“To some extent, this need to not occur as a shock escalating strategic proximity would not be anticipated to fully overwrite extant DPRK collection needs, with an ongoing need to have on the section of the DPRK to be able to evaluate and validate Russian international plan planning and targets,” DCSO explained.

Identified this article intriguing? Adhere to us on Twitter  and LinkedIn to go through far more unique material we article.


Some pieces of this report are sourced from:
thehackernews.com

Previous Post: «u.s. offers $15 million bounty to hunt down lockbit ransomware U.S. Offers $15 Million Bounty to Hunt Down LockBit Ransomware Leaders
Next Post: A New Age of Hacktivism a new age of hacktivism»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.