Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Bitter APT targets Turkey’s defense sector with WmRAT and MiyaRAT malware
Global Security

Bitter APT targets Turkey’s defense sector with WmRAT and MiyaRAT malware

AdminBy AdminDecember 17, 2024No Comments3 Mins Read
WmRAT and MiyaRAT Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


December 17, 2024Ravi LakshmananCyber ​​espionage / malware

WmRAT and MiyaRAT malware

An alleged South Asian cyber espionage group known as Bitter in November 2024, a Turkish defense sector organization was targeted to deliver two C++ malware families tracked as WmRAT and MiyaRAT.

“The attack chain used alternate data streams in the RAR archive to deliver a shortcut (LNK) file that created a scheduled task on the target machine to release further payloads,” Proofpoint researchers Nick Atfield, Constantin Klinger, Pim Truerbach, and David Galazin said in a report shared with The Hacker News.

The security company is tracking the threat under the name TA397. The adversary, which has been active since at least 2013, is also called APT-C-08, APT-Q-37, Hazy Tiger, and Orange Yali.

Previously, hacker attacks were carried out purposeful organizations in China, Pakistan, India, Saudi Arabia and Bangladesh with malware, e.g. BitterRAT, ArtraDownloaderand ZxxZ, indicating a strong Asian focus.

Cyber ​​security

According to reports from BlackBerry and Meta in 2019 and 2022, respectively.

Earlier in March of this year, the cyber security campaign NSFOCUS revealed that an unnamed Chinese government agency was hit by the Bitter phishing attack on February 1, 2024, which delivered a Trojan capable of data theft and remote control.

The latest attack chain documented by Proofpoint involved a threat actor using a decoy about public infrastructure projects in Madagascar to trick potential victims into running a mined RAR archive.

The RAR archive contained a decoy file about the World Bank’s Madagascar Community Infrastructure Development Initiative, a Windows shortcut file disguised as a PDF, and a hidden alternative data stream (ADVERTISING) file that contains the PowerShell code.

ADS refers to a feature which was introduced in the New Technology File System (NTFS) used by Windows to attach and access data streams to a file. It can be used to smuggle additional data into a file without compromising its size or appearance, thereby giving threat actors a sneaky way to hide the presence of a malicious payload in the file record of a benign file.

When the victim runs the LNK file, one of the data streams contains code to retrieve the decoy file hosted on the World Bank website, while the second ADS includes a Base64-encoded PowerShell script to open the decoy document and set up a responsible scheduled job to retrieve latest stage payloads from the jacknwoods(.)com domain.

Cyber ​​security

Both WmRAT and MiaRATas previously detailed by QiAnXin, comes with standard Remote Access Trojan (RAT) capabilities that allow the malware to collect host information, upload or download files, take screenshots, obtain geolocation data, list files and directories, and run arbitrary commands via cmd. exe or PowerShell.

The use of MiyaRAT is believed to be reserved for high-value targets due to the fact that it has been selectively deployed to only a few companies.

“These campaigns are almost certainly intelligence-gathering efforts in support of South Asian government interests,” Proofpoint said. “They aggressively use scheduled tasks to communicate with their intermediate domains to deploy malicious backdoors in targeted organizations to gain access to privileged information and intellectual property.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.