Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Homoredon uses infected removable discs to break the Western Military Mission in Ukraine
Global Security

Homoredon uses infected removable discs to break the Western Military Mission in Ukraine

AdminBy AdminApril 10, 2025No Comments2 Mins Read
Breach Western Military
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


April 10, 2025Red LakshmananCyber ​​-bue / malicious software

Violation of the Western military

Actor associated with Russia known as Homoredon .

The group is aimed at the Western country’s military mission, in accordance with the hunting team for threatening Symantec, with the first signs of malicious activity revealed on February 26, 2025.

“The original vector of the infection used by the attackers – Note In a report that shared with Hacker News.

Cybersecurity

The attack began with the creation of the Windows registry under the Key Usersist, then launched “Mshta.exe” using “Explorer.exe” to initiate a multi -stage infection chain and run two files.

The first file, named “Ntuser.dat.tmcontonTainer0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000

Другі файл, пра які ідзе гаворка, “ntuser.dat.tmcontainer000000000000000002.regtrans-ms”, прызначаны для заражэння здымных дыскаў і сеткавых дыскаў, стварыўшы файлы хуткага доступу для кожнай тэчкі для выканання шкоднаснай каманды “mshta.exe” і схаваць яго.

After March 1, 2025, the script was executed to contact the C2 server, exfiltrate system metadata and receive, in return, a useful load of the Base64, which is then used to launch the PowerShell command, designed to download the siblit new version of the same scenario.

The scenario, for its part, connects to the C2 tough server to get two more PowerShell scenarios, the first of which is a reconnaissance utility capable of fixing screenshots, running the Systeminfo command, to get detailed information about the security program, lists the files and stakes on the desktop.

Second PowerShell scenario – this is an advanced version RangeA well -known information theft that can highlight the victim’s files based on desktop enlargement and documentaries.

Cybersecurity

“This attack really means something increased for the Shuckworm that appears Tireless attention is paid to targets in Ukraine“Symantec said.

“While the group does not seem to have access to the same skill set as some other Russian groups, Shuckworm does now seem to try to compensate for this, constantly making minor changes in the code that he uses, adding exacerbation and using legitimate web services to try to reduce the risk of detection.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.