Close Menu
    Facebook X (Twitter) Instagram
    Jupiter News
    • Home
    • Technology
    • Tech Analysis
    • Tech News
    • Tech Updates
    • AI Technology
    • 5G Technology
    • More
      • Accessories
      • Computers and Laptops
      • Artificial Intelligence
      • Cyber Security
      • Gadgets & Tech
      • Internet and Networking
      • Internet of Things (IoT)
      • Machine Learning
      • Mobile Devices
      • PCs Components
      • Wearable Devices
    Jupiter News
    Home»Cyber Security»TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
    Cyber Security

    TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks

    Jupiter NewsBy Jupiter NewsApril 16, 20243 Mins Read
    Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Apr 16, 2024NewsroomMenace Intelligence / Endpoint Safety

    The risk actor tracked as TA558 has been noticed leveraging steganography as an obfuscation method to ship a variety of malware equivalent to Agent Tesla, FormBook, Remcos RAT, LokiBot, GuLoader, Snake Keylogger, and XWorm, amongst others.

    “The group made in depth use of steganography by sending VBSs, PowerShell code, in addition to RTF paperwork with an embedded exploit, inside pictures and textual content information,” Russian cybersecurity firm Optimistic Applied sciences said in a Monday report.

    The marketing campaign has been codenamed SteganoAmor for its reliance on steganography and the selection of file names equivalent to greatloverstory.vbs and easytolove.vbs.

    A majority of the assaults have focused industrial, companies, public, electrical energy, and development sectors in Latin American nations, though firms situated in Russia, Romania, and Turkey have additionally been singled out.

    Cybersecurity

    The event comes as TA558 has additionally been noticed deploying Venom RAT by way of phishing assaults geared toward enterprises situated in Spain, Mexico, america, Colombia, Portugal, Brazil, Dominican Republic, and Argentina.

    All of it begins with a phishing electronic mail containing a booby-trapped electronic mail Microsoft Excel attachment that exploits a now-patched safety flaw in Equation Editor (CVE-2017-11882) to obtain a Visible Primary Script that, in flip, fetches the next-stage payload from paste[.]ee.

    The obfuscated malicious code takes care of downloading two pictures from an exterior URL that come embedded with a Base64-encoded part that in the end retrieves and executes the Agent Tesla malware on the compromised host.

    Malware Attacks

    Past Agent Tesla, different variants of the assault chain have led to an assortment of malware equivalent to FormBook, GuLoader, LokiBot, Remcos RAT, Snake Keylogger, and XWorm, that are designed for distant entry, information theft, and supply of secondary payloads.

    The phishing emails are despatched from legitimate-but-compromised SMTP servers to lend the messages a bit of credibility and reduce the possibilities of them getting blocked by electronic mail gateways. As well as, TA558 has been discovered to make use of contaminated FTP servers to stage the stolen information.

    The disclosure comes towards the backdrop of a collection of phishing assaults focusing on authorities organizations in Russia, Belarus, Kazakhstan, Uzbekistan, Kyrgyzstan, Tajikistan, and Armenia with a malware dubbed LazyStealer to reap credentials from Google Chrome.

    Cybersecurity

    Optimistic Applied sciences is monitoring the exercise cluster below the title Lazy Koala in reference to the title of the person (joekoala), who is alleged to manage the Telegram bots that obtain the stolen information.

    That stated, the sufferer geography and the malware artifacts point out potential hyperlinks to a different hacking group tracked by Cisco Talos below the title YoroTrooper (aka SturgeonPhisher).

    “The group’s principal software is a primitive stealer, whose safety helps to evade detection, decelerate evaluation, seize all of the stolen information, and ship it to Telegram, which has been gaining reputation with malicious actors by the yr,” safety researcher Vladislav Lunin said.

    The findings additionally observe a wave of social engineering campaigns which might be designed to propagate malware households like FatalRAT and SolarMarker.

    Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we put up.





    Source link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    Jupiter News
    • Website

    Related Posts

    Cyber Security April 16, 2024

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    Cyber Security April 16, 2024

    Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack

    Cyber Security April 16, 2024

    FTC Fines Mental Health Startup Cerebral $7 Million for Major Privacy Violations

    Cyber Security April 16, 2024

    Zambia arrests 77 people in swoop on “scam” call centre

    Cyber Security April 16, 2024

    Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability

    Cyber Security April 15, 2024

    Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks

    Leave A Reply Cancel Reply

    Don't Miss
    Cyber Security April 16, 2024

    TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks

    Apr 16, 2024NewsroomMenace Intelligence / Endpoint Safety The risk actor tracked as TA558 has been…

    Broadcom changes VMware pricing amid customer backlash and EU questioning

    April 16, 2024

    Examining Longterm Machine Learning through ELLA and Voyager: Part 2 of Why LLML is the Next Game-changer of AI | by Anand Majmudar

    April 16, 2024

    Exploring Hugging Face: Text-to-Image | by Okan Yenigün | Apr, 2024

    April 16, 2024

    55 Best Podcasts (2024): True Crime, Culture, Science, Fiction

    April 16, 2024

    Actually, Corporate Investment in AI Saw a Significant Drop in 2023

    April 16, 2024
    Categories
    • 5G Technology
    • Accessories
    • AI Technology
    • Artificial Intelligence
    • Computers and Laptops
    • Cyber Security
    • Gadgets & Tech
    • Internet and Networking
    • Internet of Things (IoT)
    • Machine Learning
    • Mobile Devices
    • PCs Components
    • Tech
    • Tech Analysis
    • Tech Updates
    • Technology
    • Wearable Devices
    About Us

    Welcome to JupiterNews.online – Your Gateway to the Tech Universe!

    At JupiterNews.online, we're on a mission to explore the vast and ever-evolving world of technology. Our blog is a digital haven for tech enthusiasts, innovators, and anyone curious about the latest trends shaping the future. With a finger on the pulse of the tech universe, we aim to inform, inspire, and connect our readers to the incredible advancements defining our digital age.

    Embark on a journey with JupiterNews.online, where the possibilities of technology are explored, celebrated, and demystified. Whether you're a tech guru or just getting started, our blog is your companion in navigating the exciting, ever-changing world of technology.

    Welcome to the future – welcome to JupiterNews.online!

    Our Picks

    TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks

    April 16, 2024

    Broadcom changes VMware pricing amid customer backlash and EU questioning

    April 16, 2024

    Examining Longterm Machine Learning through ELLA and Voyager: Part 2 of Why LLML is the Next Game-changer of AI | by Anand Majmudar

    April 16, 2024

    Exploring Hugging Face: Text-to-Image | by Okan Yenigün | Apr, 2024

    April 16, 2024

    55 Best Podcasts (2024): True Crime, Culture, Science, Fiction

    April 16, 2024

    Actually, Corporate Investment in AI Saw a Significant Drop in 2023

    April 16, 2024
    Categories
    • 5G Technology
    • Accessories
    • AI Technology
    • Artificial Intelligence
    • Computers and Laptops
    • Cyber Security
    • Gadgets & Tech
    • Internet and Networking
    • Internet of Things (IoT)
    • Machine Learning
    • Mobile Devices
    • PCs Components
    • Tech
    • Tech Analysis
    • Tech Updates
    • Technology
    • Wearable Devices
    • Privacy Policy
    • Disclaimer
    • Terms & Conditions
    • About us
    • Contact us
    Copyright © 2024 Jupiternews.online All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.