Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Researchers Identify Targeted Attacks in Australia

Researchers at FireEye have identified a new targeted attack, currently hitting organizations in Australia, in order to deliver payloads designed to open remote access and steal information.

Researchers at FireEye have identified a new targeted attack, currently hitting organizations in Australia, in order to deliver payloads designed to open remote access and steal information.

The malware discovered by FireEye goes to several lengths to remain hidden, and uses a chained process to attack its victim. According to FireEye, the victims in this attack were hand picked, with the opening stage of the attack itself coming via email.

The companies being targeted were selected for unknown reasons, but the attackers are using malicious URLs embedded within the emails that link to a C&C (Command and Control) domain that uses the name of the victim or the name of a current project that is being worked on as an attempt at legitimacy.

Once the victim visits one of the C&C domains, the host revives instructions as “base64 encoded strings using a custom character set, which is further scrambled using a custom-scrambling algorithm,” FireEye reported

After that, a base64-encoded executable embedded in an HTML page is downloaded and ran on the host.

“In our experiment, since the CnC was not responding, we supplied an encoded notepad.exe in the response. The malware successfully decoded notepad.exe and launched it as setup.exe on the compromised machine,” FireEye explained.

“We have observed many variants of this malware; some even try sending hostname and IP address information back to its CnC as part of its User-Agent string in the GET request. One of the variants we observed had “IPhone 8.5” in the UA string, which we found interesting.”

It’s worth mentioning that FireEye’s findings included a list of malware that was previously disclosed by Mandiant in their APT1 report. An indexed list of the APT1 malware can be seen here

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Network Security

A zero-day vulnerability named HTTP/2 Rapid Reset has been exploited to launch some of the largest DDoS attacks in history.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet