Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Basic ideas from the 2025 state report

May 20, 2025

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025

Based on GO based on malicious programs deployed Xmrig Miner on hosts Linux through Redis configuration abuse

May 20, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Belarus -related ghosts uses macros Excel, which contains macro to deploy malware
Global Security

Belarus -related ghosts uses macros Excel, which contains macro to deploy malware

AdminBy AdminFebruary 25, 2025No Comments2 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


February 25, 2025Red LakshmananMalicious software / cyber -beno

Opposition activists in Belarus, as well as Ukrainian military and government organizations are the purpose of a new company that uses documents that are involved Picassoloader.

The cluster threats are evaluated as an extension of a long -standing company installed by an actor erected in Belarus know To match the Russian interests of security and the promotion of stories criticized by NATO.

Cybersecurity

“The company has been preparing since July-August 2024 and entered the active phase in November-December 2024,”-Researcher Sentinelone Tom Hegel – Note In a technical report that is shared with Hacker News. “The latest samples of malware and infrastructure activity (C2) (C2) show that the operation remains active in recent days.”

The starting point of the attack chain analyzed by cybersecurity company is the general document of Google Drive, which came from the account named Vladimir Nikifarech and accepted the RAR archive.

The rats file includes a malicious book Excel, which when opening the enchanting macro when the future victims allow you to launch macros. Macros continues to write the dll file, which eventually opens the way for a simplified version Picassoloader.

The next step in the system display the Exceel Excel file, while the background additional useful loads are loaded into the system. Recently in June 2024 this approach was used To deliver the cobalt after operation.

Sentinelone said she also discovered other Excel armed documents that carry baits with Ukraine’s theme to get an unknown malicious second -stage software from a remote URL (“Sciencealert (.) Store”) in the form of a seemingly harmless image JPG, technology, technique, technique, technique, technique Known as stegography. URL -Dour is more unavailable.

Cybersecurity

In another case, the Excel document registered BOOBY is used to deliver DLL called Libcmd, which is designed to launch cmd.exe and connect to Stdin/Stdout. It is directly loaded in memory in the form of .NET and executed.

“During 2024, the ghost repeatedly used the combination of Excel workbooks containing vba macro containing macro containing macro, and dropped built -in .net Downloaders, embarrassed. Confuserexsaid Hegel.

“While Belarus is not actively involved in military campaigns in the war in Ukraine, cyber -defeat actors associated with this do not have a spanning reservation against Ukrainian purposes.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Basic ideas from the 2025 state report

May 20, 2025

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025

Based on GO based on malicious programs deployed Xmrig Miner on hosts Linux through Redis configuration abuse

May 20, 2025

Malicious Pypi Packages Operating Instagram and Tiktok API to verify users’ accounts

May 20, 2025

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Basic ideas from the 2025 state report

May 20, 2025

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025

Based on GO based on malicious programs deployed Xmrig Miner on hosts Linux through Redis configuration abuse

May 20, 2025

Malicious Pypi Packages Operating Instagram and Tiktok API to verify users’ accounts

May 20, 2025

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Basic ideas from the 2025 state report

May 20, 2025

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025

Based on GO based on malicious programs deployed Xmrig Miner on hosts Linux through Redis configuration abuse

May 20, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.