puerta trasera complejo descubierto ese grupo de cibercriminales Turla utiliza desde 2014

especialistas de ESET descubiertos en el arsenal Turla nuevo instrumento poderoso que los hackers lograron ocultarse durante cinco años, al menos desde 2014.

segundoackdoor named LightNeuron compromises Microsoft mailing servers and functions as mail transfer agent, (MTA) que no es típico de este tipo de malware.

Los investigadores señalan, ese, según sus datos, LightNeuron es un backdoor fisrt que está especialmente orientado en Microsoft Exchange. Earlier Turla applied Neuron malware (aka DarkNeuron), that has nothing similar with LightNeuron and was developed with the focus on Microsoft Exchange.

LightNeuron Transport Agent
LightNeuron Transport Agent

LightNeuron not just allows attackers to trace events on mailing server, but to integrate in its work and control virtually anything.

“In architecture of mailing server, backdoor can work on same level of trust, as security products, as spam filters. Por consiguiente, this malware gives cybercriminals full control over mailing server, y, Por esto, on all letters”, – explain ESET specialists.

Hackers can intercept and redirect all mails, edit content of sent and inbox messages or block receiving some mails for users. All these opportunities make LigthNeuron one of the most powerful tools in group’s arsenal.

Adicionalmente, backdoor differs as it uses one peculiar do&C mechanism. The case is that attackers never connected Microsoft servers directly.

En lugar, they use steganography and mails with attached PDF and JPG files. Inside these letters hackers from LightNeuron team hide commands for LightnNeuron that malware opens and performs. This way of communication with malware significantly complicates its detection, as commands for backdoor might come with ordinary spam that no one pays attention to and does not trace as filters weed it out.

Modified JPG picture with embedded commands for LightNeuron
Modified JPG picture with embedded commands for LightNeuron

As reported, LightNeuron is used for attacks until now. ESET experts have already identified three organizations that suffered from it. Analysts not disclose their names, but report that it is some of the Brazilian structures, Ministry of Foreign Affair from Easter Europe and one regional diplomatic organization on the Middle East.

Fuente: https://www.welivesecurity.com

Acerca de Trojan Killer

Trojan Killer llevar portátil en su dispositivo de memoria. Asegúrese de que usted es capaz de ayudar a su PC resistir cualquier amenaza cibernética donde quiera que vaya.

también puedes ver

MageCart en la plataforma de nube Heroku

Los investigadores encontraron Varios MageCart Web skimmers En Heroku Cloud Platform

Investigadores de Malwarebytes informaron sobre la búsqueda de varios skimmers MageCart web en la plataforma de nube Heroku …

Android Spyware CallerSpy

máscaras spyware CallerSpy como una aplicación de chat Android

expertos de Trend Micro descubrieron que el malware CallerSpy, que enmascara como una aplicación de chat y Android, …

Deja una respuesta