Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?


Network Security

Researchers Identify Targeted Attacks in Australia

Researchers at FireEye have identified a new targeted attack, currently hitting organizations in Australia, in order to deliver payloads designed to open remote access and steal information.

Researchers at FireEye have identified a new targeted attack, currently hitting organizations in Australia, in order to deliver payloads designed to open remote access and steal information.

The malware discovered by FireEye goes to several lengths to remain hidden, and uses a chained process to attack its victim. According to FireEye, the victims in this attack were hand picked, with the opening stage of the attack itself coming via email.

The companies being targeted were selected for unknown reasons, but the attackers are using malicious URLs embedded within the emails that link to a C&C (Command and Control) domain that uses the name of the victim or the name of a current project that is being worked on as an attempt at legitimacy.

Once the victim visits one of the C&C domains, the host revives instructions as “base64 encoded strings using a custom character set, which is further scrambled using a custom-scrambling algorithm,” FireEye reported

After that, a base64-encoded executable embedded in an HTML page is downloaded and ran on the host.

“In our experiment, since the CnC was not responding, we supplied an encoded notepad.exe in the response. The malware successfully decoded notepad.exe and launched it as setup.exe on the compromised machine,” FireEye explained.

“We have observed many variants of this malware; some even try sending hostname and IP address information back to its CnC as part of its User-Agent string in the GET request. One of the variants we observed had “IPhone 8.5” in the UA string, which we found interesting.”

Advertisement. Scroll to continue reading.

It’s worth mentioning that FireEye’s findings included a list of malware that was previously disclosed by Mandiant in their APT1 report. An indexed list of the APT1 malware can be seen here

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Network Security

Our networks have become atomized which, for starters, means they’re highly dispersed. Not just in terms of the infrastructure – legacy, on-premises, hybrid, multi-cloud,...