Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Werewolf paper unfolds PowerModul implant in targeted cyberattacks in Russian sectors
Global Security

Werewolf paper unfolds PowerModul implant in targeted cyberattacks in Russian sectors

AdminBy AdminApril 11, 2025No Comments4 Mins Read
Paper Werewolf Deploys PowerModul Implant
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


The PowerModul Implant Powder is a werewolf paper

Actor threats known as Paper paper There is an exclusive target on Russian entities with a new implant called Powermodul.

The activity, which took place between July to December 2024, nominated organizations in the media, telecommunications, construction, state structures and energy sectors, Caspersorski – Note In a new report published on Thursday.

Werewolf’s paper, also known as a corpse, is evaluated According to Bi.zone, he has conducted at least seven companies since 2022, and the attacks are mainly aimed at the government, energy, financial, media and other organizations.

Attack chains set by the actor threats were also observed, including the devastating component in which the invasion goes beyond the distribution of malware for spying purposes to also change the passwords belonging to the staff accounts.

The attacks themselves are initiated through phishing Force.

Cybersecurity

Malicious software designed for delivery useful load to the next stage, often custom version Mythical A framework agent known as Powertaskel and QWAKMYAGENT. Another instrument in the actor’s arsenal threatening is the harmful module IIS called Before beingused to obtain Microsoft Outlook credentials, entered by users on the web client.

The latest set of attacks recorded by the Caspersorski begins with the malicious attachment of the RAR archive, which contains a executed file, which is masked as a PDF or a Word document using double expansion (ie, *.pdf.exe or *.doc.exe). When running the executable file, the bait file is loaded from the remote server and is shown to the user, and the infection goes to the next stage in the background.

“The file itself is a file of Windows (Explorer.exe or XPSRHVW.exe), with part of its code, fixed with an angry shell,” the message reads. “Shellcode is similar to what we saw in previous attacks, but in addition contains a confused mythical agent who immediately begins to communicate with the server team and control (C2).

The PowerModul Implant Powder is a werewolf paper

The alternative attack sequence is much more complicated by using the RAR archive that built a Microsoft Office document with a macro that acts as a drip for deployment and launching Powermodul, a PowerShell scenario capable of receiving and making additional PowerShell scenarios from the C2 server.

It is said that the back has been used since the beginning of 2024, and the threat subjects initially used it to download and execute Powertaskel on compromised hosts. Some other useful loads dropped by PowerModul, below –

  • FlashfileGrabberused for theft of files in removable media
  • Flashfilegrabberof1.
  • USB Wormwho is able to infect the removable environment copy of PowerModul

Powertaskel is functionally similar to Powermodul by the fact that it is also designed to launch the PowerShell scripts sent by the C2 server. But, in addition, it can send information about the purposeful environment in the form of the “Checkin” message, as well as perform other teams obtained from the C2 server as tasks. It is also equipped for the escalation of privileges using PSEXEC utility.

Cybersecurity

At least in one case, Powertaskel revealed that it receives a script with a folder component, which, in addition to repeating FlashfileGrabber’s features, includes the ability to collect files from remote systems through the hard network path using the SMB protocol.

“For the first time, they used documents with words with harmful VBA scenarios for the original infection,” Kaspersky said. “Recently, we have watched that Goffa has increasingly refusing to use Powertaskel in favor of a binary mythical agent during side motion.”

Development comes as Bi.zone attributed Another threat group is called Sapphire werewolf to a phishing company that distributes the updated version of Amethyst theft with open source.

The theft gets “powers from Telegram and various browsers, including Chrome, Opera, Yandex, Brave, Orbitum, Atom, Kometa and Edge Chromium, as well as Filezilla configuration files,” the Russian company said, Media.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.