Home Cyber Security TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks

TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks

0
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
Malware Attacks

The menace actor tracked as TA558 has been noticed leveraging steganography as an obfuscation method to ship a variety of malware akin to Agent Tesla, FormBook, Remcos RAT, LokiBot, GuLoader, Snake Keylogger, and XWorm, amongst others.

“The group made intensive use of steganography by sending VBSs, PowerShell code, in addition to RTF paperwork with an embedded exploit, inside photographs and textual content recordsdata,” Russian cybersecurity firm Constructive Applied sciences mentioned in a Monday report.

The marketing campaign has been codenamed SteganoAmor for its reliance on steganography and the selection of file names akin to greatloverstory.vbs and easytolove.vbs.

A majority of the assaults have focused industrial, providers, public, electrical energy, and development sectors in Latin American international locations, though firms positioned in Russia, Romania, and Turkey have additionally been singled out.

Cybersecurity

The event comes as TA558 has additionally been noticed deploying Venom RAT by way of phishing assaults geared toward enterprises positioned in Spain, Mexico, the US, Colombia, Portugal, Brazil, Dominican Republic, and Argentina.

All of it begins with a phishing e mail containing a booby-trapped e mail Microsoft Excel attachment that exploits a now-patched safety flaw in Equation Editor (CVE-2017-11882) to obtain a Visible Fundamental Script that, in flip, fetches the next-stage payload from paste[.]ee.

The obfuscated malicious code takes care of downloading two photographs from an exterior URL that come embedded with a Base64-encoded element that finally retrieves and executes the Agent Tesla malware on the compromised host.

Malware Attacks

Past Agent Tesla, different variants of the assault chain have led to an assortment of malware akin to FormBook, GuLoader, LokiBot, Remcos RAT, Snake Keylogger, and XWorm, that are designed for distant entry, knowledge theft, and supply of secondary payloads.

The phishing emails are despatched from legitimate-but-compromised SMTP servers to lend the messages somewhat credibility and reduce the probabilities of them getting blocked by e mail gateways. As well as, TA558 has been discovered to make use of contaminated FTP servers to stage the stolen knowledge.

The disclosure comes in opposition to the backdrop of a collection of phishing assaults focusing on authorities organizations in Russia, Belarus, Kazakhstan, Uzbekistan, Kyrgyzstan, Tajikistan, and Armenia with a malware dubbed LazyStealer to reap credentials from Google Chrome.

Cybersecurity

Constructive Applied sciences is monitoring the exercise cluster beneath the identify Lazy Koala in reference to the identify of the person (joekoala), who is claimed to regulate the Telegram bots that obtain the stolen knowledge.

That mentioned, the sufferer geography and the malware artifacts point out potential hyperlinks to a different hacking group tracked by Cisco Talos beneath the identify YoroTrooper (aka SturgeonPhisher).

“The group’s principal instrument is a primitive stealer, whose safety helps to evade detection, decelerate evaluation, seize all of the stolen knowledge, and ship it to Telegram, which has been gaining reputation with malicious actors by the 12 months,” safety researcher Vladislav Lunin mentioned.

The findings additionally observe a wave of social engineering campaigns which are designed to propagate malware households like FatalRAT and SolarMarker.

LEAVE A REPLY

Please enter your comment!
Please enter your name here