Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Gamacopy imitates Gamredon tactics in cybershlus against Russian organizations
Global Security

Gamacopy imitates Gamredon tactics in cybershlus against Russian organizations

AdminBy AdminJanuary 27, 2025No Comments2 Mins Read
Cyber Espionage
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 27 2025 gRavi LakshmananCybershlpion / Intelligence threats

Cyberscript

Previously unknown actor threats were noticed by copying the trade associated with the Kremlin Homoredon A hacker group in their cyberattacks aimed at Russian -speaking objects.

The company was attributed to the cluster threats dubbed Gamacopywhich is estimated to match another Hackers Group Core WerewolfAlso tracked both Awaken Likho and Pseudogamredon.

According to the KnownSec 404 Advanced Threat Intelligence team, the attacks use the contents associated with military facilities as a Ultravnc’s deployment, which allows the threat to the subjects to obtain distant access to hacked knots.

Cybersecurity

“TTPs (tactics, methods and procedures) of this organization imitates the tactics of the Homoredon organization, which is attacking Ukraine,” the company said. said in a report published last week.

The disclosure of information comes almost four months after Caspersorski found that Russian state institutions and industrial organizations became the target of Core Werewolf, with phishing attacks opening the way for the MeshCentral platform instead of Ultravnc.

The starting point of the attack chain reflects the one described in detail by the Russian cybersecurity company, in which the self-proclaim (SFX) archive file created using 7-ZIP acts as a channel for resetting useful loads of the next stage. This includes a batch script, which is responsible for the shipping Ultravnc while displaying the deceived PDF document.

The executed Ultravnc file was called “OneDRIVERS.exe”, probably to avoid detecting by issuing it behind the binary file associated with Microsoft OneDrive.

Knownsec 404 said this activity has several similarities with Core Werewolf companies, including the use of 7Z-SFX files to install and execute Ultravnc, Port 443 to connect to the server and use Team EnableLayeEDExpansion.

“Since its opening, this organization has often imitated TTP used by Gararedon, and deftly used open source tools as a shield to achieve its own goals while confusing the public,” the company said.

Cybersecurity

Gamacopy – one of Many participants of the threat aimed at Russian organizations after the Russo-Ukrainian War such as Sticky Werewolf (aka Pheasant), Venture wolf and paper werewolf.

“Groups such as Phaseshifters, Pseudogamredon and A fluffy wolf They stand out with their relentless phishing campaigns aimed at stealing data, ”Irina Zinovina from Positive Technologies. said.

Found this article interesting? Keep track of us Twitter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.