Cybercriminelen dat DNSpoinage campagne gevoerd, nu gewapend met nieuwe malware-software

Cybercriminal group that is responsible for DNSpionage operation became more selective in choosing victims and armed themselves with new malware Karkoff to improve effectiveness of their cyberattacks.

EENccording to FireEye, DNSpionage campaing began in the end of April 2017 and for it responsible cybercriminals that act in interests of Iranian government.

In the previous attacks, with the use of fake websites and DNS breaks, intruders redirected traffic from legitimate domains on malware ones, for the latter were used free digital certificates Let’s Encrypt.

Now group armed with new instrument for remote administering with support of connection with C&C servers through HTTP and DNS, researchers from Cisco Talos.

Since release of Cisco Talos first report about DNSpionage in the end of 2018, cybercriminals enhanced their tactic.

“We discovered some changes to the actorstactics, technieken en procedures (TTP's), including the use of a new reconnaissance phase that selectively chooses which targets to infect with malware.”, – Cisco Talos researchers reported.

With the help of espionage methods, criminals manage to bypass protection and create digital fingerprints of system they attack.

Criminals select their victims very carefully and attack them with the use of targeted fishing. They send their victims emails with attached Microsoft Word and Excel documents that contain malware macros. During the attack, malware programs through the macros change their names for «taskwin32.exe» and create planned task «onedrive updater v10.12.5» for ensuring that malware will persist in a system.

DNSpionage
In DNSpionage, upon opening the Excel document, users are greeted with the insult, “haha you are donkey [sic].” The broken English suggests the actor is unlikely a native English speaker.

This month researchers firstly detected in the arsenal of the group malware program on .Net under the name Karkoff. They say that malware is “lightweighted” and needs remote performing through C&C server.

niettemin, Karkoff possesses one interesting feature. Malware generates journal file where are stores all performed commands with time marks. Zo, with the use of this journal Karkoff victims can check what and when happened certain events.

Bron: https://blog.talosintelligence.com

Over Trojan Killer

Carry Trojan Killer Portable op je memory stick. Zorg ervoor dat u in staat om uw pc te weerstaan ​​elke cyberdreigingen overal mee naar toe bent.

Controleer ook

MageCart op de Heroku Cloud Platform

Onderzoekers vonden verschillende MageCart Web Skimmers Op Heroku Cloud Platform

Onderzoekers van Malwarebytes rapporteerde over het vinden van een aantal MageCart web skimmers op de Heroku cloud-platform …

Android Spyware CallerSpy

CallerSpy spyware maskers als een Android-chat-applicatie

Trend Micro deskundigen ontdekte de malware CallerSpy, waarachter een Android chat-toepassing en, …

Laat een antwoord achter