Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » IcePeony and Transparent Tribe target Indian organizations with cloud-based tools
Global Security

IcePeony and Transparent Tribe target Indian organizations with cloud-based tools

AdminBy AdminNovember 8, 2024No Comments4 Mins Read
Cloud-Based Tools
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


November 8, 2024Ravi LakshmananCyber ​​espionage / threat intelligence

Cloud tools

High-profile organizations in India have been targeted by malicious campaigns organized by Pakistan Transparent tribe threat actor and previously unknown cyber espionage group with China Nexus called IcePeony.

The intrusions linked to Transparent Tribe include the use of malware called ElizaRAT and a new stealth payload called ApoloStealer on specific victims of interest, Check Point said in a white paper published this week.

“The ElizaRAT samples point to the systematic abuse of cloud services, including Telegram, Google Drive and Slack, to facilitate command-and-control communication,” the Israeli company said. said.

ElizaRAT is a Windows Remote Access Tool (RAT) that was Transparent Tribe observed for the first time use in July 2023. in cyber attacks targeting India’s public sectors. Active since at least 2013, the adversary also goes by the names APT36, Datebug, Earth Karkaddan, Mythic Leopard, Operation C-Major, and PROJECTM.

Cyber ​​security

Its arsenal of malware includes Windows hacking tools, Androidand Linux devices. The increased focus on Linux machines is motivated by the Indian government’s use of a custom fork of Ubuntu called Ubuntu My OS since last year.

Infection chains are initiated by control panel (CPL) files, which are likely distributed using phishing methods. In the period from December 2023. until August 2024. observed as many as three different companies using RATs, each using Slack, Google Drive, and a virtual private server (VPS) for command and control (C2).

ApoloStealer is designed to collect files matching multiple extensions (such as DOC, XLS, PPT, TXT, RTF, ZIP, RAR, JPG, and PNG) from a compromised host and dump them on a remote server.

They say that in January 2024 the threat creator has changed its modus operandi to include a dropper component that keeps ElizaRAT running smoothly. Recent attacks have also seen an additional theft module, codenamed ConnectX, which is designed to search for files on external drives such as USB.

Cloud tools

The abuse of legitimate services Widespread use in enterprise environments increases the threat as it complicates detection and allows threat actors to blend in with legitimate activity on the system.

“The development of ElizaRAT reflects a deliberate effort by APT36 to refine its malware to better evade detection and effectively target Indian organizations,” Check Point said. “The introduction of new payloads like ApolloStealer represents a significant expansion of APT36’s malware arsenal and suggests the group is taking a more flexible, modular approach to payload deployment.”

IcePeony haunts India, Mauritius and Vietnam

The disclosure comes weeks after research group nao_sec discovered that an Advanced Persistent Threat Group (APT), which it calls IcePeony, targeted government agencies, academic institutions and political organizations in countries such as India, Mauritius and Vietnam , at least from 2023.

“Their attacks usually start with SQL injection, followed by compromise via web shells and backdoors,” said security researchers Rintaro Koike and Shoto Nakajima. “Ultimately, they’re aimed at stealing credentials.”

Cyber ​​security

One of the most noteworthy tools in its malware portfolio is IceCache, which is designed to target Microsoft Internet Information Services (IIS) specimens. An ELF binary file written in the Go programming language is a custom version with reGeorg a web shell with added file transfer and command execution features.

Cloud tools

The attacks are also characterized by the use of a unique backdoor in passive mode called IceEvent, which provides the ability to upload/download files and execute commands.

“It seems that attackers work six days a week,” the researchers note noted. “Although they are less active on Fridays and Saturdays, their only full day off seems to be Sunday. This investigation shows that the attackers are not carrying out these attacks as personal acts, but are instead engaging in them as part of organized, professional operations. “

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.