Data Exfiltration and Threat Actor Infrastructure Exposed

Huntress SOC analysts have uncovered sophisticated data exfiltration techniques employed by threat actors. The analysis reveals the use of various tools for data staging, including WinZip, 7Zip, and Windows' native tar.exe. Exfiltration methods observed include the use of finger.exe and backup utilities like restic, BackBlaze, and s5cmd. A specific incident on February 25, 2026, involved INC ransomware deployment, with the threat actor using PSEXEC for privilege escalation and creating a scheduled task to run a malicious PowerShell script. The actor utilized the Restic backup utility, renamed as winupdate.exe, to exfiltrate data. Similar tactics were observed in a previous incident on February 9, suggesting a pattern in the threat actor's methodology.

Pulse ID: 69b3f245c5cf9fd0fee7a16a
Pulse Link: https://otx.alienvault.com/pulse/69b3f245c5cf9fd0fee7a16a
Pulse Author: AlienVault
Created: 2026-03-13 11:17:25

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#7Zip #CyberSecurity #ICS #InfoSec #OTX #OpenThreatExchange #PowerShell #PsExec #RAT #RansomWare #Windows #ZIP #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
ZIP 壓縮機制大漏洞 全部防毒軟件中招 黑客可藏惡意程式碼 - unwire.hk 香港

網絡安全公司 Bombadil Systems 研究員 Chris Aziz 發現 ZIP 壓縮檔存在嚴重漏洞「Zombie ZIP」。黑客惡意篡改檔案標頭,令 VirusTotal 平台 50 款防毒引擎無法偵測惡意程式碼。用家使用 WinRAR 或 7-Zip 等解壓工具打開檔案並點擊執行,即讓黑客取得系統控制權。

香港 unwire.hk 玩生活.樂科技
ZIP 壓縮機制大漏洞 全部防毒軟件中招 黑客可藏惡意程式碼 - unwire.hk 香港

網絡安全公司 Bombadil Systems 研究員 Chris Aziz 發現 ZIP 壓縮檔存在嚴重漏洞「Zombie ZIP」。黑客惡意篡改檔案標頭,令 VirusTotal 平台 50 款防毒引擎無法偵測惡意程式碼。用家使用 WinRAR 或 7-Zip 等解壓工具打開檔案並點擊執行,即讓黑客取得系統控制權。

香港 unwire.hk 玩生活.樂科技

𝟳-𝗭𝗜𝗣, 𝗨𝗡 𝗗𝗢𝗠𝗜𝗡𝗜𝗢 𝗙𝗥𝗔𝗨𝗗𝗢𝗟𝗘𝗡𝗧𝗢 𝗗𝗜𝗙𝗙𝗢𝗡𝗗𝗘 𝗖𝗢𝗗𝗜𝗖𝗘 𝗠𝗔𝗟𝗘𝗩𝗢𝗟𝗢

Attenzione per chi usa 7-Zip!
Sfruttando la tecnica dei falsi tutorial e degli errori di battitura in fase di ricerca, un sito malevolo (del tutto identico all'originale), sta diffondendo un pericoloso trojan.

Si ripete uno schema già visto in precedenza che approfitta di fretta e disattenzione in fase di installazione/update del #software .

Leggi su:
https://www.zeusnews.it/n.php?c=31807

@sicurezza

#sicurezza #cybersecurity #virus #trojan #7zip