Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Multiply
Global Security

Multiply

AdminBy AdminApril 18, 2025No Comments4 Mins Read
Multi-Stage Malware Attack
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Multi -stage attack malware

A new multi -stage attack has been noted, which provides malware such as Tesla options, Remcos Rat and Xloader.

“The attackers are increasingly counting on such complex delivery mechanisms to avoid detection, bypassing traditional sandboxes and ensuring successful delivery and execution of useful load,” “Palo Alto Networks Unit 42 Researcher Sakib Hanzada” – Note In the company’s technical record.

The starting point of the attack is a deceptive letter that presents the request for the malicious attachment of the 7-ZIP archive, which contains the JavaScript file coded (.jse).

The e -mail, which was observed in December 2024, falsely claimed that the payment was made and urged the recipient to revise the invested order file. Running the useful load of JavaScript launches the infection sequence, and the file acts as a download for the PowerShell script from the external server.

Cybersecurity

The scenario, in turn, places a useful load that encodes the Base64, which is further deciphered, written in the temporary catalog and is performed. That’s where something interesting happens: the attack leads to the dropper of the next stage, which is either composed of .Net or Autoit.

In case of .Net. A snake key or Xoloader – deciphered and entered into the running process “regasm.exe”, the technique observed in Past companies agent Tesla.

On the other hand, Autoit is a executable file, introducing an additional layer in an attempt to further complicate the analysis efforts. The Autoit script in the executable file includes an encrypted useful load responsible for downloading the final Shellcode, causing the .Net file to be introduced into the “Regsvcs.exe” process, which eventually leads to Tesla’s deployment.

Multi -stage attack malware

“This suggests that the attacker uses several ways to enhance the stability and detection of evasion,” Hanzad said. “The attacker’s focus remains a multi -layered attack chain, not a complex plug.”

“By investing simple stages, not focusing on very complex methods, attackers can create elastic attack chains that complicate the analysis and detection.”

Ironhusky provides a new version of Mysterysnail rats

The disclosure of information occurs as Caspersorski minute A company that focuses on state organizations located in Mongolia and Russia, with a new version of malware called Mystery Rat. The activity was related to the Chinese -speaking threatening actor called Ironhusky.

Ironhusky, assessed active at least 2017, was Previously documented A Russian cybersecurity company in October 2021 in connection with zero operation of the CVE-2021-40449, a lack of Win32K escalation to deliver Mysterysnail.

The infections come from the malicious Microsoft Management (MMC) script, which mimics the Word document from the National Mongolian Land Agency (“The Literary Employee”). The scenario is designed to obtain the ZIP archive with the bait document, legal binary (“ciscoclabhost.exe”) and malicious dll (“ciscosparklauncher.dll”.

It is not quite known how the MMC scenario extends to the goals that are of interest, although the nature of the bait document suggests that it can be through a phishing campaign.

As is observed in many attacks“Ciscocolabhost.exe” is used to select dll, intermediary rear pipeline Project.

Cybersecurity

Backdoor supports opportunities to run command shells, download/download files, directory content, file deletion, new processes and stop yourself. These teams are then used for a rats to download Mysterysnail.

The latest malicious software version is capable of taking almost 40 teams, allowing it to perform file management operations, execute commands through cmd.exe, spawns and kill processes, manage services and connect to network resources using DLL.

Caspersci said they noticed that the attackers were throwing a “converted and lighter version” of Mystery Codenape Mysterymonosnail after the affected companies had initiated preventive actions for blocking the invasion.

“This version does not have as many opportunities as the Mystery Rat version,” the company said. “It was programmed to have only 13 major teams used to list the contents of the directory contents, write data into files, and launch processes and remote shells.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.