Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Rare Werewolf APT uses legitimate software in attacks on hundreds of Russian enterprises
Global Security

Rare Werewolf APT uses legitimate software in attacks on hundreds of Russian enterprises

AdminBy AdminJune 10, 2025No Comments3 Mins Read
Rare Werewolf APT
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


June 10, 2025Red LakshmananCryptocurrency / malicious software

Rare Werewolf APT

Actor threats known as Rare werewolf (Previously a rare wolf) was associated with a series of cyberattacks aimed at Russia and the Commonwealth of Independent Countries (CIS).

“The distinctive feature of this threat is that attackers prefer legal software – Note. “The malicious functionality of the company described in this article is implemented through command files and PowerShell scripts.”

The intention of the attacks is to establish remote access to the compromised hosts and powers of Siphon, as well as the deployment of the Xmrig cryptocurrency miner. Activities have influenced hundreds of Russian users covering industrial enterprises and engineering schools, with fewer infections also recorded in Belarus and Kazakhstan.

Rare werewolfAlso known as library werewolves and reset, is the nickname Track Record Strange organizations in Russia and Ukraine. It is believed that it has been actively working at least since 2019.

Cybersecurity

According to Bi.zone, the actor threats receive Initial access using phishing emails using the fixing document theft, Telegram Messenger data and Drop as MIPKO employees monitor. WebbrowserPassviewand Defender Control for interaction with the infected system, password crop and disabling antivirus software.

The latest set of attacks recorded by the Caspersorsky shows the use of phishing sheets as a vehicle to deliver malware, using an archives protected by a password containing executable files as a starting point to activate infection.

The archive contains an institution used to deploy a legitimate tool called 4T Minimizer, as well as other useful loads, including a document document that mimics the payment order.

“This software can minimize the launch of the system tray, which allows the attackers to obscure their presence in the compromised system,” Kaspersky said.

These intermediate use loads are used to obtain additional files from the remote server, including the control of the defenders and ImpudentA legitimate utility to send stolen data to a controlled attacker’s email address via SMTP. The attacks are also characterized by using the AnyDesk Remote Desktop software and the Windows Party scenarios to facilitate data theft and miner deployment.

A noticeable aspect of the batch script is that it launches the PowerShell scenario, which includes the capabilities for automatic victim systems at 1 o’clock in the local time and allows the attackers to be removed through the four -hour window through Anydesk. Then the machine closes at 5am with the planned assignment.

“This is a common technique to use the third legal software for malware, making the detection and attributing APT activity more complex,” Kaspersky said. “All malicious functionality is still based on installation, team and powershell.”

Cybersecurity

Disclosure occurs as positive technology disclosed The fact that the financially motivated group of cybercrime, dubbed DarkGaboon, is aimed at Russian structures using a ransom lockbit 3.0. Darkgaboon, For the first time discovered In January 2025, it is said to have been working since May 2023.

Attacks, notes companies Revenge Rat. The use of an easily accessible tool is considered as an attempt by attackers to combine with a wider cybercrime activity and to challenge the attribution’s efforts.

“DarkGaboon is not a customer of Lockbit Raa Service and acts independently, as showing the use of the publication version of Lockbit’s ransom, lack of traces of data exports in the strike companies and the traditional threats to publish stolen information (data leak site),” said a positive researcher of the winner of the Cossacks.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025

Why DNS Safety – Your First Cyber ​​Protection?

June 11, 2025

Interpol Demonrates 20,000+ malicious IPS related to 69 malware work

June 11, 2025

GPS Sinotrack GPS devices are vulnerable to distance driving through default passwords

June 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025

Why DNS Safety – Your First Cyber ​​Protection?

June 11, 2025

Interpol Demonrates 20,000+ malicious IPS related to 69 malware work

June 11, 2025

GPS Sinotrack GPS devices are vulnerable to distance driving through default passwords

June 11, 2025

Microsoft Patches 67 vulnerability, including Zero-Day Webdav, is exploited in the wild

June 11, 2025

Researchers disclose configuration risks, including five CVE, in the Salesforce Industry Cloud

June 10, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.