» 뉴스 » DNSpoinage 캠페인 실시 사이버 범죄자, 새로운 악성 소프트웨어로 지금 무장

DNSpoinage 캠페인 실시 사이버 범죄자, 새로운 악성 소프트웨어로 지금 무장

Cybercriminal group that is responsible for DNSpionage operation became more selective in choosing victims and armed themselves with new malware Karkoff to improve effectiveness of their cyberattacks.

에이ccording to FireEye, DNSpionage campaing began in the end of April 2017 and for it responsible cybercriminals that act in interests of Iranian government.

In the previous attacks, with the use of fake websites and DNS breaks, intruders redirected traffic from legitimate domains on malware ones, for the latter were used free digital certificates Let’s Encrypt.

Now group armed with new instrument for remote administering with support of connection with C&C servers through HTTP and DNS, researchers from 시스코 탈로스.

Since release of Cisco Talos first report about DNSpionage in the end of 2018, cybercriminals enhanced their tactic.

“We discovered some changes to the actorstactics, 기술 및 절차 (TTPs), including the use of a new reconnaissance phase that selectively chooses which targets to infect with malware.”, – Cisco Talos researchers reported.

With the help of espionage methods, criminals manage to bypass protection and create digital fingerprints of system they attack.

Criminals select their victims very carefully and attack them with the use of targeted fishing. They send their victims emails with attached Microsoft Word and Excel documents that contain malware macros. During the attack, malware programs through the macros change their names for «taskwin32.exe» and create planned task «onedrive updater v10.12.5» for ensuring that malware will persist in a system.

DNSpionage
In DNSpionage, upon opening the Excel document, users are greeted with the insult, “haha you are donkey [sic].” The broken English suggests the actor is unlikely a native English speaker.

This month researchers firstly detected in the arsenal of the group malware program on .Net under the name Karkoff. They say that malware is “lightweighted” and needs remote performing through C&C 서버.

독서  NordVPN에서 은행 Bolik 트로이 목마는 마스크 자체를

그렇지만, Karkoff possesses one interesting feature. Malware generates journal file where are stores all performed commands with time marks. 그래서, with the use of this journal Karkoff victims can check what and when happened certain events.

출처: https://blog.talosintelligence.com

[합계: 0    평균: 0/5]

트로이 킬러 소개

메모리 스틱에 트로이 킬러 휴대용 운반. 당신은 당신이 어디를 가든 당신의 PC가 어떤 사이버 위협에 저항 도울 수 있는지 확인하십시오.

또한 확인

Heroku가 클라우드 플랫폼에 MageCart

연구진은 여러 MageCart 웹 스키머에 Heroku가 클라우드 플랫폼 발견

Malwarebytes 연구원은 Heroku가 클라우드 플랫폼에서 여러 MageCart 웹 스키머를 찾는 것에 대해보고 …

안드로이드 스파이웨어 CallerSpy

안드로이드 채팅 응용 프로그램으로 CallerSpy 스파이웨어 마스크

트렌드 마이크로의 전문가들은 악성 코드 CallerSpy 발견, 안드로이드 채팅 응용 프로그램으로하는 마스크와, …

회신을 남겨주