Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Caspersorsky refers to Mare’s head up to twelve, focusing on Russian structures through common C2 servers
Global Security

Caspersorsky refers to Mare’s head up to twelve, focusing on Russian structures through common C2 servers

AdminBy AdminMarch 21, 2025No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


March 21, 2025Red LakshmananMalicious software / cyber -ataka

Two well -known clusters by threats called cadence -headed goals, and twelve, probably united their strength to target Russian formations, new results are revealed.

“The main mare has greatly relied on the twelve -related tools. In addition – Note. “This suggests that potential cooperation and joint companies between two groups.”

Both Head of mare and Twelve Previously, Caspersorski was recorded in September 2024, and the former vulnerability was used in Winrar (CVE-2023-3831) to obtain the initial access and delivery of malicious programs, and in some cases, even families of ransom, such as Lockbit for Windows and Babuk for Linux (ESXI), are in exchange.

On the other hand, twelve is observed that the production of devastating attacks, using various publicly available tools to encrypt these victims and irrevocably destroying them with a glass cleaning infrastructure to prevent restoration efforts.

Cybersecurity

The latest Casperial analysis shows the use of a chapter of two new tools, including the COBINT, the back used Excobalt and Crypt As a result of the attacks aimed at Russian companies in the past, as well as custom implant by the nickname Phantomjitter, which is installed on servers to perform remote teams.

The deployment of COBINT was also observed in the attacks mounted on twelve, with overlappings, revealed between the hacking of the crews and crystals, which indicates some tactical connection between different groups aimed at Russia.

Other initial access ways that are operated by Head Mare Attack of trusted relationship.

“The attackers used Proxylogon to execute a team to download and launch COBINT on the server,” Kaspersky said, emphasizing the use of an updated resilience mechanism, which evades the planned tasks in favor of creating new privileged local users on a business automation platform server. Then these credentials are used to connect to the server using RDP for transfer and reactive tools.

In addition to assigning the names of harmful useful loads that mimic benign files of the operating system (such as Calc.exe or Winuac.exe), the threat subjects were found that remove traces of their activity, clearing the events and use proxy tools and tunne tools such as Gost and Cloudflar.

Some other utilities are used

  • quser.exe, Tasklist.exe and Netstat.exe for system exploration
  • FSCAN and Softperfect Network Scanner for Local Network exploration
  • Adrecon to collect information from Active Directory
  • Mimikatz, secretsdump and
  • RDP for lateral motion
  • MREMOTENG, SMBEXEC, WMIEXEC, PAEEXEC and PSEXEC for the distance communication
  • RCLONE for data transfer

The attacks are completed by the deployment of LockBit 3.0 and Babuk Ransomware on the compromised hosts, after which she threw a note that urges the victims to contact them in the telegram to decipher her files.

“Head Mare actively expands its set of methods and tools,” Kaspersky said. “In recent attacks, they received initial access to the target infrastructure, using not only phishing emails with feats, but also because of compromise contractors. Head Mare works with twelve to start attacks on public and private companies in Russia.”

Cybersecurity

Development comes as Bi.zone related In December 2024, a phishing campaign in a phishing campaign that supplied a loader that supplied malicious software in December, which delivered a loader that supplied the malicious software in December, which delivered a loader.

According to the Russian company, the Russian company is very reminiscent of another company called Enveloped#sleep The fact that Securonix was recorded in October 2024, as led to the deployment of the back, called Veelschel in penetrations aimed at Cambodia and probably other southeastern Asian countries.

Last month too bi.zone minute Prolonged Cyber ​​-fades put by bloody wolves to deliver Netsupport Rat as part of a company that has broken more than 400 systems in Kazakhstan and Russia, which noted the shift from the transition Strrat.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.