Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025

Hackers focus on over 70 Microsoft Exchange servers to steal credentials via Keyloggers

June 24, 2025

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

June 24, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Hacktivists use WinRAR vulnerability in attacks on Russia and Belarus
Global Security

Hacktivists use WinRAR vulnerability in attacks on Russia and Belarus

AdminBy AdminSeptember 3, 2024No Comments3 Mins Read
Hacktivists Exploits WinRAR Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


September 3, 2024Ravi LakshmananRansomware/Malware

Hacktivists exploit WinRAR vulnerability

A hacktivist group known as Mare’s head was linked to cyber attacks aimed exclusively at organizations located in Russia and Belarus.

“Head Mare uses more advanced methods to gain initial access,” Kaspersky said in an analysis of the group’s tactics and tools on Monday.

“For example, attackers took advantage of a relatively recent one CVE-2023-38831 a vulnerability in WinRAR that allows an attacker to execute arbitrary code on the system via a specially crafted archive. This approach allows the group to more efficiently deliver and mask malicious payloads.”

Cyber ​​security

Head Mare, which has been active since 2023, is one of a group of hackers attacking Russian organizations in the context of the Russian-Ukrainian conflict that began a year ago.

It also supports a presence on Xwhere confidential information and internal documents of the victims were leaked. The group’s attack targets are the government, transportation, energy, manufacturing and environmental sectors.

Unlike other hackers who likely operate to cause “maximum damage” to companies in the two countries, Head Mare also encrypts victims’ devices using LockBit for Windows and Babuk for Linux (ESXi) and demands a ransom to decrypt the data.

They are also part of his toolkit PhantomDL and PhantomCorethe first of which a Go based backdoor which is capable of delivering additional payloads and uploading files of interest to the control server (C2).

PhantomCore (aka PhantomRAT), the predecessor of PhantomDL, is a remote access trojan with similar features that allows you to download files from a C2 server, upload files from a compromised host to a C2 server, and execute commands in the cmd.exe command line interpreter.

“Attackers create scheduled tasks and registry values ​​called MicrosoftUpdateCore and MicrosoftUpdateCoree to disguise their activities as tasks related to Microsoft software,” Kaspersky said.

“We also found that some of the LockBit samples used by the group had the following names: OneDrive.exe (and) VLC.exe. These samples were located in the C:\ProgramData directory, posing as legitimate OneDrive and VLC apps.”

It is established that both artifacts are distributed through phishing campaigns in the form of business documents with double extensions (for example, solution #201-5_10ве_001-24 to PIV Ekran-SOI-2.pdf.exe or tz na razrobtku.pdf.exe ).

Cyber ​​security

Another important component of his arsenal of attack is A scrapthe open source C2 framework and a set of various public tools such as rsockstun, ngrok, and Mimikatz that facilitate discovery, lateral movement, and credential harvesting.

The intrusions are completed by deploying either LockBit or Babuk depending on the target environment, followed by a ransom message demanding payment in exchange for a decryptor to unlock the files.

“The tactics, methods, procedures and tools used by the Head Mare group are broadly similar to those of other cluster-related groups targeting organizations in Russia and Belarus in the context of the Russian-Ukrainian conflict,” the Russian cybersecurity vendor said.

“However, the group is distinguished by its use of specially crafted malware such as PhantomDL and PhantomCore, as well as its use of a relatively new vulnerability, CVE-2023-38831, to penetrate the infrastructure of its victims in phishing campaigns.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025

Hackers focus on over 70 Microsoft Exchange servers to steal credentials via Keyloggers

June 24, 2025

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

June 24, 2025

APT28 uses signal chat to expand malicious Beardhell ​​and Testament software in Ukraine

June 24, 2025

Talk CTEM we all need

June 24, 2025

Hackers operate incorrectly configured API Docker to hand over cryptocurrency via Tor Network

June 24, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025

Hackers focus on over 70 Microsoft Exchange servers to steal credentials via Keyloggers

June 24, 2025

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

June 24, 2025

APT28 uses signal chat to expand malicious Beardhell ​​and Testament software in Ukraine

June 24, 2025

Talk CTEM we all need

June 24, 2025

Hackers operate incorrectly configured API Docker to hand over cryptocurrency via Tor Network

June 24, 2025

US House forbids WhatsApp on official security and protection devices

June 24, 2025

Salt Typhoon associated with China

June 24, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025

Hackers focus on over 70 Microsoft Exchange servers to steal credentials via Keyloggers

June 24, 2025

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

June 24, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.