Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Darkwatchman, sheriff malicious software hit
Global Security

Darkwatchman, sheriff malicious software hit

AdminBy AdminMay 1, 2025No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Russian companies were sent as part of a large -scale phishing Darkwatchman.

The targets include organizations in the media, tourism, financing and insurance, production, retail, energy, telecommunications, transport and biotechnology sectors, Russian cybersecurity company F6 – Note.

Activities are evaluated as a financially motivated group called Hive0117, which has been attributed to IBM X-Force for attacks Aimed at users of Lithuania, Estonia and Russia, which cover telecommunications, electronic and industrial sectors.

Then in September 2023, Darkwatchman’s malicious software was again used In the field of phishing campaign aimed at energy, finance, transport and safety software based in Russia, Kazakhstan, Latvia and Estonia.

Russian banks, retailers and markets, telecommunications operators, agro-industrial enterprises, fuel and energy companies, logistics enterprises and IT firms were isolated Again in November 2023 with Darkwatchman using the courier delivery bait.

Cybersecurity

Trojan, based on JavaScript based JavaScript, Darkwatchman capable of key, collect system information and deploy secondary useful loads. It was First documented In December 2021.

“Of course, the nature of Darkwatchman and its use JavaScript and Keylogger, written in C#, as well as the ability to delete traces of its existence in compromised systems, testify to some complex opportunities,” the IBM said in 2023.

The latest set of attacks involves sending phishing emails containing false archives protected by password, which after opening provides the Darkwatchman option with improving opportunities to evade detection.

Ukraine, focused on a new sheriff

The disclosure of information occurs when IBM X-Forth stated that an indefinite enterprise in defense of Ukraine was sent in the first half of 2024, when previously an unregistered back of Windows called Sheriff.

“The actor of the threat used the popular news portal in Ukraine, ukr.net, to hold the sheriff – the side,” – Researcher Gala Mur – Note In a report published in late March 2025. “The modular back can perform commands aimed at actors, collect screenshots and hidden extrophilti victim data using API Dropbox Cloud Storage.”

“The malicious software focuses on expressive data and screenshots, while maintaining a low profile designed for long compromises.”

It is suspected that the web -resort may have been broken for malware in early March 2024. The sheriff is equipped to download and control multiple components, including a screenshot module, with teams and configuration values ​​received as a ZIP file comments.

“The actor’s access to the largest news portal of Ukraine will place them for a number of high effects attacks and acts with extended aggravation,” Mur said. “In this particular incident, the threat actor may have abused the trusted domains for malicious software without raising suspicion.”

The background also establishes the “suicide” function, which, when remotely causes the operator, stops all activity and removes the directory containing malicious software, and the Dropbox folder used for command and control (C2).

Cybersecurity

IBM noted that certain aspects of malicious programs intersect with the types of Turla Casino and Crutchas and as Prikormka Groundbait and CloudWizard Bad Magic Operation.

“Both CloudWizard and Sheriff contain the” getsettings “feature https://thehackernews.com/” Get_settings “to get each module’s configuration,” the company said. “Cloudwizard, Prikormka and Sheriff shares the same screenshot that takes up 15 minutes. Cloudwizard files and prickormka files are called” Tree “, which is the name of the sheriff used for the exports of the file list.”

The opening of the back stems from the report of the State Service of Ukraine on special communication and protection of information (SSSCIP), warning about increasing the number of incidents by 48% in the second half of 2024 (2.576) compared to the previous six -month period (1739).

A total of 4 315 cyber incidents were registered in 2024, compared to 1350 in 2021, 2194 in 2022 and 2543 in 2023.

“Russian hackers actively implement automation using supply chain attacks to penetrate through programs – Note. “The focus in the attack is the collection of intelligence that can affect the operational situation at the front. In particular, the opponent aims at the situation and specialized defense enterprises.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.