Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » The Abudi Liho cyber attack group is targeting the Russian government with modern tools
Global Security

The Abudi Liho cyber attack group is targeting the Russian government with modern tools

AdminBy AdminOctober 8, 2024No Comments2 Mins Read
Russian Government with Advanced Tools
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


October 8, 2024Ravi LakshmananCyber ​​threat / APT attack

Russian government with advanced tools

State institutions and industrial enterprises of Russia are the object of permanent activity of the cluster named Wake up there is.

“Attackers now prefer to use the agent for the legitimate MeshCentral platform instead of the UltraVNC module that they previously used to gain remote access to systems,” Kaspersky said. saidwhich details the new campaign, which began in June 2024 and lasted until at least August.

The Russian cyber security company said the campaign primarily targeted Russian government agencies, their contractors and industrial enterprises.

Cyber ​​security

Awaken Likho, also tracked as Core Werewolf and PseudoGamaredon, was documented for the first time BI.ZONE in June 2023 due to cyber attacks targeting the defense and critical infrastructure sectors. The group is believed to be active from at least August 2021.

Phishing attacks involve distributing malicious executable files disguised as Microsoft Word or PDF documents by giving them double extensions such as “doc.exe”, “.docx.exe” or “.pdf.exe”, so that only .docx and Users are shown parts of the .pdf extension.

However, opening these files was found to trigger the installation of UltraVNC, allowing threat actors to gain full control over compromised nodes.

Other attacks by Core Werewolf also targeted a Russian military base in Armenia, as well as a Russian research institute involved in weapons development. findings from FACCT earlier in May.

One notable change observed in these cases concerns the use of a self-extracting archive (SFX) to facilitate the stealth installation of UltraVNC while displaying a harmless decoy document to targets.

Cyber ​​security

The latest attack chain discovered by Kaspersky also relies on an SFX archive file created with 7-Zip that, when opened, runs a file called “MicrosoftStores.exe” that then unzips the AutoIt script for the final open-source run. MeshAgent remote control tool.

“These actions allow APT to remain in the system: the attackers create a scheduled job that runs a batch file, which in turn runs MeshAgent to establish a connection to the MeshCentral server,” Kaspersky said.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.