Remove Analysis Remove Encryption Remove File names Remove Libraries
article thumbnail

China-linked APT41 group targets Hong Kong with Spyder Loader

Security Affairs

.” reads the analysis published by Symantec. Spyder Loader loads AES-encrypted blobs to create the wlbsctrl.dll which acts as a next-stage loader that executes the content. Like the sample analyzed by Cyberreason, the Spyder Loader sample analyzed by Symantec uses the CryptoPP C++ library. ” continues the report.

article thumbnail

New KilllSomeOne APT group leverages DLL side-loading

Security Affairs

The name KilllSomeOne comes from the phrase ‘KilllSomeOne’ used in the DLL side-loading attacks, the group is using poorly-written English messages relating to political subjects. . Dynamic-link library (DLL) side-loading takes advantage of how Microsoft Windows applications handle DLL files.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Iran-linked APT TA453 targets Windows and macOS systems

Security Affairs

” reads the analysis published by Proofpoint. At the provided URL, a password-encrypted.rar file named “Abraham Accords & MENA.rar” was hosted. The.rar archive contained a dropper named “Abraham Accords & MENA.pdf.lnk.” ” continues the analysis.

article thumbnail

Crooks target Healthcare facilities involved in Coronavirus containment with Ransomware

Security Affairs

” reads the analysis published by PaloAlto Networks. “The emails all contained a malicious Rich Text Format (RTF) phishing lure with the file name 20200323- sitrep -63- covid -19. ” continues the analysis. ” continues the analysis. ” continues the analysis.

article thumbnail

The Long Run of Shade Ransomware

Security Affairs

Technical analysis. The phishing email contains a.zip file named “slavneft.zakaz.zip”, which means something like “slavneft order” in English, showing a direct reference to “Slavneft”. It contains a russian speaking JavaScript file named “«??? «??? «?????????» ??????????? Content of README.txt file.

article thumbnail

JSWorm: The 4th Version of the Infamous Ransomware

Security Affairs

Despite the name could remind to JavaScript language and a possible “worm” logic, the malware does not include either of the two characteristics. Technical Analysis. JSWorm encrypts all the user files appending a new extension to their name. The HTA file corresponds to the ransom window shown in Figure 1.

article thumbnail

Iran-linked group Cobalt Dickens hit over 60 universities worldwide

Security Affairs

This operation is similar to the threat group’s August 2018 campaign , using compromised university resources to send library-themed phishing emails.” ” reads the analysis published by Secureworks. The landing page appears to be identical or quite similar to the spoofed library resource. and Switzerland.