Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Russian RomCom attacks Ukrainian government with new SingleCamper RAT variant
Global Security

Russian RomCom attacks Ukrainian government with new SingleCamper RAT variant

AdminBy AdminOctober 17, 2024No Comments3 Mins Read
SingleCamper RAT Variant
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


October 17, 2024Ravi LakshmananThreat Intelligence / Malware

SingleCamper RAT option

The Russian threat known as RomCom has been linked to a new wave of cyberattacks targeting Ukrainian government agencies and unidentified Polish organizations since at least late 2023.

Intrusions are characterized by the use of a variety of Art RAT RomCom called SingleCamper (aka SnipBot or RomCom 5.0), reported Cisco Talos, which monitors a cluster of activity under the alias UAT-5647.

“This version loads directly from the registry into memory and uses a loopback address to communicate with its loader,” security researchers Dmitry Karzhevin, Ashir Malhotra, Vanya Sveitzer, and Vitor Ventura noted.

Cyber ​​security

Also tracked as Storm-0978, Tropical Scorpius, UAC-0180, UNC2596, and Void Rabisu, RomCom has been involved in various motivational operations such as ransomware, extortion, and targeted credential harvesting since its appearance in 2022.

It has been estimated that the operational pace of their attacks has increased in recent months with the aim of establishing long-term storage of compromised networks and stealing data, which suggests clear espionage.

To that end, the threat creator is allegedly “aggressively expanding its tools and infrastructure to support a wide range of malware components built in different languages ​​and platforms,” ​​such as C++ (ShadyHammock), Rust (DustyHammock), Go (CLUEGG), and Lua (A DROP).

The attack chains start with a phishing message delivered by a loader coded in C++ (MeltingClaw) or Rust (RustyClaw) that serves to deploy the ShadyHammock and DustyHammock backdoors, respectively. At the same time, a decoy document is shown to the recipient to maintain the ruse.

While the DustyHammock is designed to communicate with the control server (C2), execute arbitrary commands, and download files from the server, the ShadyHammock acts as a launch pad for the SingleCamper and also listens for incoming commands.

Despite ShadyHammock’s additional features, it is believed to be the predecessor of DustyHammock, given the fact that attacks on the latter were seen as recently as September 2024.

Cyber ​​security

SingleCamper, the latest version of the RomCom RAT, is responsible for a wide range of post-hacking activities that involve downloading PuTTY’s Plink tool to create remote tunnels with enemy-controlled infrastructure, network reconnaissance, lateral movement, user and system detection, and data theft.

“This particular series of attacks targeting high-ranking Ukrainian organizations is likely designed to fulfill UAT-5647’s two-pronged strategy in stages—establish long-term access and steal data for as long as possible to further espionage motives, then potentially turn to deploying ransomware to disrupt and likely benefit financially from the compromise,” the researchers said.

“It is also likely that Polish organizations were also targeted, based on keyboard language checks performed by the malware.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025

Testing the handle only to meet the requirements? Time to change your approach

May 15, 2025

5 BCDR Essentials for Effective Rushing

May 15, 2025

New Chrome vulnerability allows for a cross -out data leak through a forklift policy

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025

Testing the handle only to meet the requirements? Time to change your approach

May 15, 2025

5 BCDR Essentials for Effective Rushing

May 15, 2025

New Chrome vulnerability allows for a cross -out data leak through a forklift policy

May 15, 2025

Bion and Ransomexx Exploit SAP Netweaver Nafice for deploying Pipemagic Trojan

May 14, 2025

Samsung Patches Cve-2025-4632 used to deploy Mirai Botnet via Magicinfo 9 Exploit

May 14, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.