Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Silent Lynx using powershell loaders, Golang and C ++ in multi -stage cyberattack
Global Security

Silent Lynx using powershell loaders, Golang and C ++ in multi -stage cyberattack

AdminBy AdminFebruary 5, 2025No Comments2 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


05 February 2025Red LakshmananIntelligence threats / malicious software

Previously, an unregistered actor of the threat, known as the silent trot, was associated with cyberattami aimed at various formations in Kyrgyzstan and Turkmenistan.

“This group of threats previously targeted by organizations in Eastern Europe and Central Asia involved in making economic decisions and the banking sector,” – Researcher Seqrite Labs Subhajeet Singhaa – Note In a technical report published at the end of last month.

The targets of the group attacks include embassies, lawyers, banks supported by government and analytical tanks. Activities were related to the actor of the threat of Kazakhstan-medication with the middle level of trust.

Cybersecurity

The infections begin with an e -mail spear that contains an attachment of the RAR archive, which eventually acts as a vehicle for harmful useful loads responsible for providing distant access to the impaired hosts.

The first of the two companies identified by the cybersecurity company on December 27, 2024, uses the RAR archive to launch the ISO file, which in turn includes a harmful C ++ and a PDF. The following file continues to launch the PowerShell scenario, which uses Telegram Bots (named “@South_korea145_bot” and “@south_afr_angl_bot”) to perform teams and exports.

Some of the Bots teams include Curl commands to download and save additional useful loads from the remote server (“PWEOBMXDLBOI (.) COM”) or Google Drive.

Another company, on the contrary, uses a malicious RAR archive containing two files: bait: 8082 “).

Cybersecurity

SEQRITE Labs said there is some level of tactical overlapping between the actor threats and Yorotrooper (AKA Sturgeonphisher), which was associated with attacks aimed at the Commonwealth countries (CIS) using PowerShell and Golang tools.

“Silent Lynx demonstrates a complex multi-stage attack strategy using ISO files, C ++ loaders, PowerShell scripts and hunting implants,” Siga said.

“Their dependence on Telegram Bots for Command and Control In conjunction with bait documents and regional targeting, which also emphasizes their emphasis on espionage in Central Asia and SPAC.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.