Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Israeli organizations are exposed to cyber attacks using the Donut and Sliver frameworks
Global Security

Israeli organizations are exposed to cyber attacks using the Donut and Sliver frameworks

AdminBy AdminJuly 6, 2024No Comments2 Mins Read
Donut and Sliver Frameworks
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


July 3, 2024Information hallCyber ​​attack / malware

Donut and Sliver frames

Cybersecurity researchers discovered an attack campaign targeting various Israeli organizations with public frameworks such as Donut and Sliver.

The company, which is said to be highly targeted at its core, “uses targeted WordPress infrastructure and custom websites as a payload delivery engine, but targets various entities in unrelated verticals and relies on well-known open source malware” , HarfangLab said in last week’s report.

A French company tracks activity called “As Supposedly a Grasshopper.” This is a link to an attacker-controlled server (“auth.economy-gov-il(.)com/SUPPOSED_GRASSHOPPER.bin”) to which the first-stage downloader connects.

Written in Nim, this loader is rudimentary and designed to load second-tier malware from a proxy server. It is delivered via a virtual hard disk (VHD) file that is believed to be distributed through custom WordPress sites as part of a continuous download scheme.

Cyber ​​security

The second stage payload received from the server Donuta shellcode generation framework that serves as a conduit for open source deployment Cobalt strike alternative no A scrap.

“Operators have also made some notable efforts in acquiring dedicated infrastructure and deploying a realistic WordPress website to deliver payloads,” the researchers said. “Overall, it looks like this campaign could really be a small team effort.”

Donut and Sliver frames

The ultimate purpose of the campaign is currently unknown, although HarfangLab theorizes that it may also be related to a legitimate penetration testing operation, a possibility that raises its own set of questions related to transparency and the need to impersonate Israeli government agencies.

The disclosure comes as SonicWall’s threat research team Capture Labs detailed an infection chain that uses Excel spreadsheets as a starting point to take down the Trojan known as Orcinius.

“This is a multi-stage Trojan that uses Dropbox and Google Docs to download second-stage payloads and stay updated,” the company said in a statement. said. “It contains an obfuscated VBA macro that connects to Windows to monitor open windows and keystrokes and creates persistence using registry keys.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025

Cisco Patches Cve-2025-20188 (10.0 CVSS) in iOS XE, which allows root feat via JWT

May 8, 2025

Ottokit WordPress plugin with 100K+ Instals Hit Gratoits, focused on several disadvantages

May 7, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.