• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
tetrisphantom: cyber espionage via secure usbs targets apac governments

TetrisPhantom: Cyber Espionage via Secure USBs Targets APAC Governments

You are here: Home / General Cyber Security News / TetrisPhantom: Cyber Espionage via Secure USBs Targets APAC Governments
October 18, 2023

Federal government entities in the Asia-Pacific (APAC) location are the concentrate on of a lengthy-functioning cyber espionage campaign dubbed TetrisPhantom.

“The attacker covertly spied on and harvested delicate info from APAC governing administration entities by exploiting a specific type of protected USB push, safeguarded by hardware encryption to guarantee the protected storage and transfer of information between pc methods,” Kaspersky reported in its APT trends report for Q3 2023.

The Russian cybersecurity business, which detected the ongoing exercise in early 2023, stated the USB drives present components encryption and are used by govt corporations around the globe to securely shop and transfer info, boosting the likelihood that the attacks could develop in the long run to have a world wide footprint.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

The clandestine intrusion established has not been connected to any identified menace actor or group, but the high-degree of sophistication of the marketing campaign factors to a country-state crew.

“These functions were being carried out by a highly competent and resourceful risk actor, with a keen curiosity in espionage pursuits inside of sensitive and safeguarded governing administration networks,” Noushin Shabab, senior security researcher at Kaspersky, claimed. “The attacks have been particularly focused and experienced a quite constrained quantity of victims.”

A crucial hallmark of the campaign is the use of several destructive modules to execute instructions and collect information and information and facts from compromised devices and propagate the an infection to other machines using the exact or other safe USB drives as a vector.

The malware factors, in addition to self-replicating by connected secure USB drives to breach air-gapped networks, are also able of executing other destructive files on the contaminated systems.

“The attack includes sophisticated instruments and methods,” Kaspersky mentioned, including the attack sequences also entailed the “injection of code into a respectable obtain management plan on the USB travel which acts as a loader for the malware on a new device.”

Cybersecurity

The disclosure arrives as a new and unknown advanced persistent menace (APT) actor has been connected to a established of attacks concentrating on authorities entities, armed forces contractors, universities, and hospitals in Russia by using spear-phishing emails that contains booby-trapped Microsoft Office environment documents.

“This initiates a multi-amount an infection scheme primary to the set up of a new Trojan, which is principally designed to exfiltrate documents from the victim’s machine and attain manage by executing arbitrary commands,” Kaspersky said.

The attacks, codenamed BadRory by the enterprise, played out in the sort of two waves – 1 in October 2022, followed by a next in April 2023.

Observed this posting exciting? Comply with us on Twitter  and LinkedIn to browse a lot more exceptional content we submit.


Some parts of this write-up are sourced from:
thehackernews.com

Previous Post: «new admin takeover vulnerability exposed in synology's diskstation manager New Admin Takeover Vulnerability Exposed in Synology’s DiskStation Manager
Next Post: Unraveling Real-Life Attack Paths – Key Lessons Learned unraveling real life attack paths – key lessons learned»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.