• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
stealth soldier: a new custom backdoor targets north africa with

Stealth Soldier: A New Custom Backdoor Targets North Africa with Espionage Attacks

You are here: Home / General Cyber Security News / Stealth Soldier: A New Custom Backdoor Targets North Africa with Espionage Attacks
June 9, 2023

A new custom made backdoor dubbed Stealth Soldier has been deployed as section of a set of remarkably-specific espionage attacks in North Africa.

“Stealth Soldier malware is an undocumented backdoor that mostly operates surveillance functions these as file exfiltration, display and microphone recording, keystroke logging and thieving browser facts,” cybersecurity firm Verify Point explained in a technical report.

The ongoing operation is characterized by the use of command-and-management (C&C) servers that mimic internet sites belonging to the Libyan Ministry of Overseas Affairs. The earliest artifacts affiliated with the campaign day back again to Oct 2022.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

The attacks start with opportunity targets downloading bogus downloader binaries that are shipped by way of social engineering attacks and act as a conduit for retrieving Stealth Soldier, although at the same time displaying a decoy empty PDF file.

The custom made modular implant, which is considered to be utilized sparingly, permits surveillance abilities by accumulating listing listings and browser qualifications, logging keystrokes, recording microphone audio, using screenshots, uploading information, and functioning PowerShell instructions.

Stealth Soldier

“The malware utilizes unique varieties of commands: some are plugins that are downloaded from the C&C and some are modules inside the malware,” Look at Position explained, including the discovery of three variations of Stealth Soldier implies that it truly is remaining actively preserved by its operators.

Some of the elements are no lengthier offered for retrieval, but the screen seize and browser credential stealer plugins are stated to have been inspired by open up source initiatives out there on GitHub.

Approaching WEBINAR🔐 Mastering API Security: Knowledge Your Real Attack Floor

Discover the untapped vulnerabilities in your API ecosystem and just take proactive measures towards ironclad security. Be part of our insightful webinar!

Join the Session.wn-button,.wn-label,.wn-label:right afterdisplay screen:inline-block.check_two_webinarmargin:20px 10px 30px 0background:#f9fbffcolor:#160755padding: 5%border:2px good #d9deffborder-radius:10pxtext-align:leftbox-shadow:10px 10px #e2ebff-webkit-border-major-left-radius:25px-moz-border-radius-topleft:25px-webkit-border-base-correct-radius:25px-moz-border-radius-bottomright:25px.wn-labelfont-sizing:13pxmargin:20px 0font-pounds:600letter-spacing:.6pxcolor:#596cec.wn-label:afterwidth:50pxheight:6pxcontent:”border-leading:2px good #d9deffmargin: 8px.wn-titlefont-measurement:21pxpadding:10px 0font-excess weight:900text-align:leftline-height:33px.wn-descriptiontextual content-align:leftfont-dimension:15.6pxline-peak:26pxmargin:5px !importantcolor:#4e6a8d.wn-buttonpadding:6px 12pxborder-radius:5pxbackground-coloration:#4469f5font-sizing:15pxcolor:#fff!importantborder:0line-peak:inherittext-decoration:none!importantcursor:pointermargin:15px 20pxfloat:leftfont-body weight:500letter-spacing:.2px

What is far more, the Stealth Soldier infrastructure exhibits overlaps with infrastructure related with a different phishing campaign dubbed Eye on the Nile, which specific Egyptian journalists and human rights activists in 2019.

The growth alerts the “very first probable re-appearance of this threat actor” because then, suggesting the group is geared toward surveillance against Egyptian and Libyan targets.

“Specified the modularity of the malware and the use of numerous stages of an infection, it is possible that the attackers will keep on to evolve their ways and approaches and deploy new versions of this malware in the in the vicinity of long run,” Look at Place stated.

Found this posting attention-grabbing? Abide by us on Twitter  and LinkedIn to read additional exceptional content we article.


Some pieces of this report are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Espionage Attacks in North Africa Linked to “Stealth Soldier” Backdoor
Next Post: Organizations Urged to Address Critical Vulnerabilities Found in First Half of 2023 Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New Critical Security Flaws Expose Exim Mail Servers to Remote Attacks
  • Cybercriminals Using New ASMCrypt Malware Loader Flying Under the Radar
  • Lazarus Group Impersonates Recruiter from Meta to Target Spanish Aerospace Firm
  • Post-Quantum Cryptography: Finally Real in Consumer Apps?
  • Microsoft’s AI-Powered Bing Chat Ads May Lead Users to Malware-Distributing Sites
  • Progress Software Releases Urgent Hotfixes for Multiple Security Flaws in WS_FTP Server
  • Cisco Warns of Vulnerability in IOS and IOS XE Software After Exploitation Attempts
  • GitHub Repositories Hit by Password-Stealing Commits Disguised as Dependabot Contributions
  • China’s BlackTech Hacking Group Exploited Routers to Target U.S. and Japanese Companies
  • The Dark Side of Browser Isolation – and the Next Generation Browser Security Technologies

Copyright © TheCyberSecurity.News, All Rights Reserved.