Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Crouching Yeti APT Actor Still Targeting Industrial Sectors: Kaspersky

The threat actor group known as Crouching Yeti, Energetic Bear and Dragonfly continues to target organizations across the world. However, experts believe the group has switched targets and infrastructure.

The threat actor group known as Crouching Yeti, Energetic Bear and Dragonfly continues to target organizations across the world. However, experts believe the group has switched targets and infrastructure.

According to Kaspersky, the Russian-speaking group has been involved in several advanced persistent threat (APT) campaigns since 2010, targeting organizations in sectors such as energy, machinery, IT, pharmaceutical, manufacturing, education, and construction.

The actor has leveraged exploits, social engineering, watering hole attacks, and trojanized software installers to distribute the pieces of malware it uses to steal valuable data from the targeted organizations’ systems.

In a blog post published on Tuesday, Kaspersky reported that the 69 command and control (C&C) servers it has been monitoring have communicated to roughly 3,700 victims connecting from nearly 58,000 IP addresses.

The C&C servers are located mainly in the United States, Germany, Russia and the UK, and they handle more than 1,000 unique victim connection each day. However, Kaspersky’s analysis shows that the number of hits has decreased considerably over the past months after security firms started publishing reports on Crouching Yeti’s activities.

The threat group uses three main pieces of malware in its operations: the Havex Trojan, which has been seen in attacks against industrial control systems (ICS), the Sysmain Trojan, and the ClientX backdoor. The largest number of devices infected with these threats have been spotted in Spain (8,051 IP addresses), followed by Poland (5,196), Greece (4,399), Italy (4,283), Serbia (3,426), Turkey (3,216), Japan (3,211), Germany (3,115), the United States (2,359) and Romania (2,054).

“The most widely used Trojan on these C2 server is Havex with 3375 unique victims. Sysmain counts 314 and ClientX 10 (as in the last year’s report). For Havex, version 024 is still the most widespread, followed by version 043,” Kaspersky wrote in its blog post.

In an IT security report published late last year, Germany’s Federal Office for Information Security (BSI) noted that Energetic Bear had targeted German companies’ SCADA systems using Havex.

Advertisement. Scroll to continue reading.

“In this update, we did not see relevant changes in the infrastructure or in the C2 activity,” Kaspersky researchers noted. “Taking into account the nature of this threat actor and the operational status of the infrastructure, it is likely the operators already switched infrastructure, techniques and targets.”

Learn More at the 2015 ICS Cyber Security Conference

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join us as we delve into the transformative potential of AI, predictive ChatGPT-like tools and automation to detect and defend against cyberattacks.

Register

As cybersecurity breaches and incidents escalate, the cyber insurance ecosystem is undergoing rapid and transformational change.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Cybercrime

The recent ransomware attack targeting Rackspace was conducted by a cybercrime group named Play using a new exploitation method, the cloud company revealed this...

Malware & Threats

Threat actors are increasingly abusing Microsoft OneNote documents to deliver malware in both targeted and spray-and-pray campaigns.