Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Hackers use Cloudflare tunnels and DNS Fast-Flux to hide GammaDrop malware
Global Security

Hackers use Cloudflare tunnels and DNS Fast-Flux to hide GammaDrop malware

AdminBy AdminDecember 6, 2024No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


December 6, 2024Hacker newsMalware / Threat Intelligence

A threat actor known as Hammeredon the use of leverage was observed Cloudflare Tunnels as a tactic to hide its staging infrastructure, which hosts a malware called GammaDrop.

The activity is part of the constant phishing campaign In a new analysis, Recorded Future’s Insikt Group said it has targeted Ukrainian organizations since at least early 2024 and is designed to eliminate Visual Basic Script malware.

The cybersecurity company is tracking the threat under the name BlueAlpha, which is also known as Aqua Blizzard, Armageddon, Hive0051, Iron Tilden, Primitive Bear, Shuckworm, Trident Ursa, UAC-0010, UNC530 and Winterflounder. A group believed to be active since 2014 affiliated with the Federal Security Service of Russia (FSB).

“BlueAlpha recently started using Cloudflare Tunnels to hide the intermediate infrastructure in use GammaDropan increasingly popular method used by cybercriminal groups to deploy malware,” Insikt Group noted.

Cyber ​​security

“BlueAlpha continues to use the Domain Name System (DNS) fast flowing GammaLoad (C2) command and control infrastructure to make it more difficult to track and disrupt C2 communications to maintain access to compromised systems.”

The adversary’s use of Cloudflare Tunnel was previously documented by Slovak cyber security company ESET in September 2024 as part of attacks on Ukraine and various NATO countries, namely Bulgaria, Latvia, Lithuania and Poland.

He also described the threat actor’s skill as reckless and not particularly focused on stealth, even though they make every effort to “avoid being locked down by security products and try very hard to maintain access to compromised systems.”

“Gamaredon attempts to maintain its access by simultaneously deploying multiple simple bootloaders or backdoors,” ESET added. “The lack of sophistication of Gamaredon’s tools is compensated by frequent updates and the use of obfuscation that changes regularly.”

The tools are primarily designed to steal valuable data from web applications running in Internet browsers, email clients, and instant messaging programs such as Signal and Telegram, as well as to download additional payloads and distribute malware via connected USB drives. .

  • PteroPSLoad, PteroX, PteroSand, PteroDash, PteroRisk and PteroPowder – payload loading
  • PteroCDrop – Dropping Visual Basic Script payloads
  • PteroClone – Delivering payloads using the rclone utility
  • PteroLNK – Arming connected USB drives
  • PteroDig – Weaponize LNK files in desktop folder for saving
  • PteroSocks – Provides partial SOCKS proxy functionality
  • PteroPShell, ReVBShell – functions as a remote shell
  • PteroPSDoor, PteroVDoor – Exfiltration of specific files from the file system
  • PteroScreen – Capture and extract screenshots
  • PteroSteal – Exfiltrate credentials stored by web browsers
  • PteroCookie – Exfiltration of cookies stored by web browsers
  • PteroSig – Exfiltrate data stored by the Signal application
  • PteroGram – Exfiltrate data stored in the Telegram application
  • PteroBleed – Exfiltrate data saved by Telegram and WhatsApp web versions from Google Chrome, Microsoft Edge and Opera
  • PteroScout – Exfiltration of system information

The latest series of attacks covered by Recorded Future involves sending phishing emails with HTML attachments that use a technique called HTML smuggling to activate the infection process via embedded JavaScript code.

Cyber ​​security

When opened, the HTML attachments drop a 7-Zip archive (“56-27-11875.rar”) containing a malicious LNK file that uses mshta.exe to deliver GammaDrop, an HTA program responsible for writing to disk a custom bootloader named GammaLoad, which then contacts the C2 server to receive additional malware.

The GammaDrop artifact is extracted from a proxy server behind a Cloudflare tunnel located at the amsterdam-sheet-veteran-aka.trycloudflare(.)com domain.

For its part, GammaLoad uses DNS-over-HTTPS (DoH) providers such as Google and Cloudflare to resolve C2 infrastructure when traditional DNS fails. It also uses the fast DNS flow technique to obtain the C2 address if the first attempt to contact the server fails.

“BlueAlpha will likely continue to improve its evasion techniques using widely used legitimate services such as Cloudflare, making detection difficult for traditional security systems,” Recorded Future said.

“Continued improvements in HTML smuggling and DNS-based security are likely to create new challenges, especially for organizations with limited threat detection capabilities.”

Did you find this article interesting? This article is from one of our respected partners. Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.