article thumbnail

ToxicEye RAT exploits Telegram communications to steal data from victims

Security Affairs

“The bot is embedded into the ToxicEye RAT configuration file and compiled into an executable file (an example of a file name we found was ‘paypal checker by saint.exe’). Experts also noticed that the RAT implements Ransomware features such as the ability to encrypt and decrypt victim’s files.

article thumbnail

Sofacy APT group used a new tool in latest attacks, the Cannon

Security Affairs

The novelty in the last attacks is represented by the use of a tool that has not been seen before, attackers also used an uncommon technique to deliver the malware and to avoid running in a sandbox. ” Cannon acts as a downloader and relies on emails to communicate with the C2 server and receive instructions. Pierluigi Paganini.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New PowerExchange Backdoor linked to an Iranian APT group

Security Affairs

The backdoor uses emails for C2 communications, where the C2 is the victim’s Microsoft Exchange server. The infection chain commenced with spear phishing messages using a zip file named Brochure.zip in attachment. Karkoff ) “The PowerExchange backdoor is a simple yet effective tool.

article thumbnail

DownEx cyberespionage operation targets Central Asia

Security Affairs

exe ” and used the icon image associated with docx files. The executable is a self-contained archive that once executed will extract two files. One of the files is the bait document, while the other one is an HTA file named log extension with embedded VBScript code The HTA file contacts the C2 server to fetch a second-stage payload.

article thumbnail

Chinese cyberspies used a new PlugX variant, dubbed THOR, in attacks against MS Exchange Servers

Security Affairs

Researchers from Palo Alto Networks Unit 42 team tracked the new version of the PlugX malware as Thor, they reported that the RAT was used as a post-exploitation tool deployed on one of the compromised servers. The analysis of the file revealed that it includes the encrypted and compressed PlugX payload. ” reads the analysis.

article thumbnail

Monero Cryptocurrency campaign exploits ProxyLogon flaws

Security Affairs

“The attack begins with a PowerShell command to retrieve a file named win_r.zip from another compromised server’s Outlook Web Access logon path (/owa/auth).” ” The attack used a PowerShell command to retrieve a file named win_r.zip from another compromised server’s Outlook Web Access logon path (/owa/auth). .

article thumbnail

New Linux Ransomware BlackSuit is similar to Royal ransomware

Security Affairs

According to government experts, the Royal ransomware attacks targeted numerous critical infrastructure sectors including, manufacturing, communications, healthcare and public healthcare (HPH), and education. ReadMe file name: README.BlackSuit.txt. similarities in jumps based on BinDiff, a comparison tool for binary files.”