Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

More than 70 organizations in several sectors aimed at Chinese Cyber ​​Spying Group

June 9, 2025

Two different botnets exploit the vulnerability of the WAZUH server to launch attacks based on peaceful

June 9, 2025

Think what your IDP or CASB covers the shadow? These 5 risks prove differently

June 9, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Pakistani hackers expand goals in India with Rat and Spark Curlback and Spark
Global Security

Pakistani hackers expand goals in India with Rat and Spark Curlback and Spark

AdminBy AdminApril 14, 2025No Comments3 Mins Read
Pakistan-Linked Hackers
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


April 14, 2025Red LakshmananCyber ​​-Ataka / malicious software

Pakistani hackers

Actor threats associated with Pakistan Pile of rat.

The activity revealed by Seqrite in December 2024 sent Indian structures within the railway, oil and gas ministries, which note the expansion of targeting crew outside the government, protection, maritime sectors and universities.

“One of the notable shifts in the latest companies is the transition from using HTML files (HTA) to accepting Microsoft Installer (MSI) packages as the mainstay mechanism,” Satwick Ram Ram Researche – Note.

Side jar suspected of lining inside A transparent tribe (AKA APT36) This has been active at least since 2019. That’s the so -called imitates the assault chains related to another actor threatened called Selected to deliver your own useful load.

Cybersecurity

In June 2024 isolated Using Enchanted HTA Sidecopy files that use the use methods previously observed in attacks. The files have also been found to contain links to the URLs, which feature RTF files, defined as used Sidewinder.

Attacks ended in deployment The action of the rat and ReverseratTwo well-known malicious programs attributed to a side copy, and several other useful loads, including Cheex to steal documents and images, USB coapters for Siphon Data from attached discs, and a .net rat that is able to execute 30 teams sent from the remote server.

The rat is equipped to steal browser data based on Firefox, and based on Chromium all credits, profiles and cookies, functions borrowed in asyncrat.

“Apt36 Focus is basically Linux Systems, whereas Sidecopy the Windows System, which add new useful loads to your arsenal,” – said Seqrite at the time.

Rat with curly and sparkle rats

The latest conclusions show further ripening of the hacking that comes in itself, using email based on the malware distribution vector. These e -mail messages contain different types of bait documents, ranging from the lists of festive workers to cybersecurity, issued by the public sector called Hindustan Petroleum Corporation Limited (HPCL).

One cluster activity is particularly characteristic, given its ability to navigate both in Windows and Linux systems, which eventually leads to the deployment of the Trous-platform Trojan known as Spark rats And the new Windows CodenAple Cudback Rat based on Windows, which can collect the system information, download files from the host, execute arbitrary commands, exalt the privileges and list users’ accounts.

Cybersecurity

A second cluster was marked with the use of bait files as a way to initiate a multi -stage infection process that reduces the custom version Xeno ratwhich includes the main methods of manipulation of the lines.

“The group has moved from using HTA files to MSI packages as the mainstream mechanism and continues to use modern methods such as DLL-loading, reflexive and deciphering AES using PowerShell,” the company said.

“In addition, they use individual open source tools such as Xeno Rat and Spark Rat, as well as deploying a recently identified curry rat. Fair domains and counterfeit sites are used to conduct phishing and a useful load, emphasizing that the group that continues to increase sustainability.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

More than 70 organizations in several sectors aimed at Chinese Cyber ​​Spying Group

June 9, 2025

Two different botnets exploit the vulnerability of the WAZUH server to launch attacks based on peaceful

June 9, 2025

Think what your IDP or CASB covers the shadow? These 5 risks prove differently

June 9, 2025

Openai prohibits chatgpt accounts used by Russian, Iranian and Chinese hacking groups

June 9, 2025

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

More than 70 organizations in several sectors aimed at Chinese Cyber ​​Spying Group

June 9, 2025

Two different botnets exploit the vulnerability of the WAZUH server to launch attacks based on peaceful

June 9, 2025

Think what your IDP or CASB covers the shadow? These 5 risks prove differently

June 9, 2025

Openai prohibits chatgpt accounts used by Russian, Iranian and Chinese hacking groups

June 9, 2025

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

More than 70 organizations in several sectors aimed at Chinese Cyber ​​Spying Group

June 9, 2025

Two different botnets exploit the vulnerability of the WAZUH server to launch attacks based on peaceful

June 9, 2025

Think what your IDP or CASB covers the shadow? These 5 risks prove differently

June 9, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.