Cybercrime

‘Asylum Ambuscade’ Group Hit Thousands in Cybercrime, Espionage Campaigns

ESET has linked several cybercrime and espionage campaigns to a threat actor tracked as Asylum Ambuscade.

ESET has linked several cybercrime and espionage campaigns to a threat actor tracked as Asylum Ambuscade.

A threat actor tracked as ‘Asylum Ambuscade’ has been engaging in both cybercrime and espionage campaigns for roughly three years, cybersecurity firm ESET reports.

Also tracked as TA445, the group was initially detailed in March 2022, after it was observed targeting European government personnel involved in helping Ukrainian refugees.

Asylum Ambuscade has been active since at least 2020 and previously compromised “government officials and employees of state-owned companies in Central Asia countries and Armenia”, ESET says.

While espionage represents the spotlight of the group’s activities, Asylum Ambuscade mainly engaged in cybercrime campaigns over the past three years, with more than 4,500 victims identified worldwide, including cryptocurrency traders, small and medium businesses (SMBs), and individuals.

The majority of the threat actor’s victims are in North America, but ESET also identified compromised entities in Asia, Africa, Europe, and South America.

Asylum Ambuscade’s cybercrime and espionage campaigns employ similar compromise chains, which either start with ads leading to a malicious JavaScript file and multiple redirections, or with a spear-phishing email with a malicious attachment leading to a malware downloader.

To evade detection, the threat actor has been using different variants of the SunSeed downloader, which were written in Lua, Tcl, and Visual Basic, and of the Ahkbot second-stage downloader, written in AutoHotkey or Node.js (named Nodebot).

Neither SunSeed nor Ahkbot are available on underground forums, and ESET believes that the identified cybercrime and espionage campaigns are operated by the same threat actor, Asylum Ambuscade.

Advertisement. Scroll to continue reading.

Furthermore, the cybersecurity firm believes Asylum Ambuscade is responsible for a 2020 campaign targeting US and Canadian bank users and for the recently detailed Screentime campaign, in which a screenlogger was used to collect information on high-value targets.

“Asylum Ambuscade is a cybercrime group mostly targeting SMBs and individuals in North America and Europe. However, it appears to be branching out, running some recent cyberespionage campaigns on the side, against governments in Central Asia and Europe from time to time,” ESET concludes.

Related: Threat Actor Abuses SuperMailer for Large-scale Phishing Campaign

Related: Microsoft Will Name Threat Actors After Weather Events

Related: Cybercrime Losses Exceeded $10 Billion in 2022: FBI

Related Content

Nation-State

Iranian state-sponsored group APT42 is targeting NGOs, government, and intergovernmental organizations with two new backdoors.

Malware & Threats

Russia-linked APT28 deploys the GooseEgg post-exploitation tool against numerous US and European organizations.

Nation-State

Two Chinese cyberespionage groups have been targeting entities and member countries affiliated with ASEAN.

Nation-State

Earth Krahang, likely a penetration team of Chinese government contractor I-Soon, has compromised 48 government entities worldwide.

Malware & Threats

Chinese APT Evasive Panda compromises a software developer’s supply chain to target Tibetans with malicious downloaders.

Malware & Threats

Chinese threat actors target Ivanti VPN appliances with new malware designed to persist system upgrades.

Nation-State

A possibly China-linked threat actor uses a custom backdoor in a cyberespionage campaign ongoing since at least 2021.

Malware & Threats

The China-linked cyberespionage group Blackwood has been caught delivering malware to entities in China and Japan. 

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version