• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
russian hacker group toddycat uses advanced tools for industrial scale data

Russian Hacker Group ToddyCat Uses Advanced Tools for Industrial-Scale Data Theft

You are here: Home / General Cyber Security News / Russian Hacker Group ToddyCat Uses Advanced Tools for Industrial-Scale Data Theft
April 22, 2024

The threat actor recognized as ToddyCat has been observed using a large variety of equipment to keep obtain to compromised environments and steal beneficial info.

Russian cybersecurity organization Kaspersky characterized the adversary as relying on a variety of systems to harvest information on an “industrial scale” from mainly governmental businesses, some of them protection related, positioned in the Asia-Pacific area.

“To gather substantial volumes of information from quite a few hosts, attackers need to automate the facts harvesting procedure as much as doable, and deliver a number of alternate suggests to continually access and keep an eye on devices they attack,” security researchers Andrey Gunkin, Alexander Fedotov, and Natalya Shornikova claimed.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


ToddyCat was initial documented by the firm in June 2022 in connection with a sequence of cyber attacks aimed at government and armed forces entities in Europe and Asia considering that at least December 2020. These intrusions leveraged a passive backdoor dubbed Samurai that will allow for distant entry to the compromised host.

A closer evaluation of the danger actor’s tradecraft has considering the fact that uncovered supplemental info exfiltration resources like LoFiSe and Pcexter to get information and add archive files to Microsoft OneDrive.

Cybersecurity

The most current set of packages entail a blend of tunneling info collecting application, which are set to use following the attacker has now obtained entry to privileged person accounts in the infected method. This contains –

  • Reverse SSH tunnel using OpenSSH
  • SoftEther VPN, which is renamed to seemingly innocuous information like “boot.exe,” “mstime.exe,” “netscan.exe,” and “kaspersky.exe”
  • Ngrok and Krong to encrypt and redirect command-and-command (C2) site visitors to a certain port on the concentrate on procedure
  • FRP shopper, an open-resource Golang-based mostly quick reverse proxy
  • Cuthead, a .NET compiled executable to research for paperwork matching a specific extension or a filename, or the date when they are modified
  • WAExp, a .NET plan to capture data involved with the WhatsApp web app and conserve it as an archive, and
  • TomBerBil to extract cookies and credentials from web browsers like Google Chrome and Microsoft Edge

“The attackers are actively applying procedures to bypass defenses in an endeavor to mask their existence in the technique,” Kaspersky mentioned.

Russian Hacker Group ToddyCat

“To protect the organization’s infrastructure, we recommend incorporating to the firewall denylist the methods and IP addresses of cloud providers that give targeted traffic tunneling. In addition, buyers should be essential to prevent storing passwords in their browsers, as it helps attackers to obtain sensitive information and facts.”

Uncovered this posting fascinating? Comply with us on Twitter  and LinkedIn to browse a lot more unique content we article.


Some areas of this short article are sourced from:
thehackernews.com

Previous Post: «pentera's 2024 report reveals hundreds of security events per week, Pentera’s 2024 Report Reveals Hundreds of Security Events per Week, Highlighting the Criticality of Continuous Validation
Next Post: Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware russia's apt28 exploited windows print spooler flaw to deploy 'gooseegg'»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk

Copyright © TheCyberSecurity.News, All Rights Reserved.