Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Pakistani hackers expand goals in India with Rat and Spark Curlback and Spark
Global Security

Pakistani hackers expand goals in India with Rat and Spark Curlback and Spark

AdminBy AdminApril 14, 2025No Comments3 Mins Read
Pakistan-Linked Hackers
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


April 14, 2025Red LakshmananCyber ​​-Ataka / malicious software

Pakistani hackers

Actor threats associated with Pakistan Pile of rat.

The activity revealed by Seqrite in December 2024 sent Indian structures within the railway, oil and gas ministries, which note the expansion of targeting crew outside the government, protection, maritime sectors and universities.

“One of the notable shifts in the latest companies is the transition from using HTML files (HTA) to accepting Microsoft Installer (MSI) packages as the mainstay mechanism,” Satwick Ram Ram Researche – Note.

Side jar suspected of lining inside A transparent tribe (AKA APT36) This has been active at least since 2019. That’s the so -called imitates the assault chains related to another actor threatened called Selected to deliver your own useful load.

Cybersecurity

In June 2024 isolated Using Enchanted HTA Sidecopy files that use the use methods previously observed in attacks. The files have also been found to contain links to the URLs, which feature RTF files, defined as used Sidewinder.

Attacks ended in deployment The action of the rat and ReverseratTwo well-known malicious programs attributed to a side copy, and several other useful loads, including Cheex to steal documents and images, USB coapters for Siphon Data from attached discs, and a .net rat that is able to execute 30 teams sent from the remote server.

The rat is equipped to steal browser data based on Firefox, and based on Chromium all credits, profiles and cookies, functions borrowed in asyncrat.

“Apt36 Focus is basically Linux Systems, whereas Sidecopy the Windows System, which add new useful loads to your arsenal,” – said Seqrite at the time.

Rat with curly and sparkle rats

The latest conclusions show further ripening of the hacking that comes in itself, using email based on the malware distribution vector. These e -mail messages contain different types of bait documents, ranging from the lists of festive workers to cybersecurity, issued by the public sector called Hindustan Petroleum Corporation Limited (HPCL).

One cluster activity is particularly characteristic, given its ability to navigate both in Windows and Linux systems, which eventually leads to the deployment of the Trous-platform Trojan known as Spark rats And the new Windows CodenAple Cudback Rat based on Windows, which can collect the system information, download files from the host, execute arbitrary commands, exalt the privileges and list users’ accounts.

Cybersecurity

A second cluster was marked with the use of bait files as a way to initiate a multi -stage infection process that reduces the custom version Xeno ratwhich includes the main methods of manipulation of the lines.

“The group has moved from using HTA files to MSI packages as the mainstream mechanism and continues to use modern methods such as DLL-loading, reflexive and deciphering AES using PowerShell,” the company said.

“In addition, they use individual open source tools such as Xeno Rat and Spark Rat, as well as deploying a recently identified curry rat. Fair domains and counterfeit sites are used to conduct phishing and a useful load, emphasizing that the group that continues to increase sustainability.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.