Fresh from #SentinelLABS: our story on how #dprk threat actors try to leverage threat intel platforms and leak their own secrets. ๐Ÿ•ต๏ธโ€โ™‚๏ธ๐Ÿคฆโ€โ™‚๏ธ
https://s1.ai/nk-ops

#SentinelLABS researcher #TomHegel writes about an extension of the long-running #Ghostwriter campaign targeting opposition activists in #Belarus as well as #Ukrainian military and government organizations with weaponized #Excel documents lures.

๐Ÿ”— https://www.sentinelone.com/labs/ghostwriter-new-campaign-targets-ukrainian-government-and-belarusian-opposition/

Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition

Latest Ghostwriter campaign brings Belarusian opposition into its sights for the first time as it continues weaponizing XLS docs to drop malware.

SentinelOne
Phishing campagne richt zich op hoogprofiel x-accounts voor cryptofraude

Een nieuwe phishing campagne heeft zich gericht op hoogprofiel X-accounts, waaronder die van journalisten en politieke figuren, met als doel cryptocurrency fra

Tech Nieuws

#SentinelLabs ha descubierto como BlueNoroff (subgrupo de hackers norcoreanos que pertenecen a Lazarus Group) ha lanzado la campaรฑa 'Hidden Risk' dirigida a usuarios de #macOS

#ciberseguridad #tech

https://mecambioamac.com/hackers-norcoreanos-se-dirigen-a-usuarios-de-macos-para-robar-criptomonedas/

The #AcidPour malware is a new variant of #AcidRain targeting #Linux x86 systems in #Ukraine, as discovered by #SentinelLabs researchers. Unlike its predecessor designed for #MIPS architecture, AcidPour specifically targets x86 Linux distributions such as #Ubuntu, #Mint, #Fedora, and #Debian. It introduces new capabilities, including references to Unsorted Block Images (#UBI) and #Logical Volume Manager (LVM) virtual block devices, suggesting an expansion in the range of potential targets. AcidPour's distinct codebase and wiping logic, particularly for devices like LVMs, indicate an evolved threat strategy. Despite the evolving nature of malware threats, SentinelLabs has alerted stakeholders in Ukraine, though the full scope and specific targets of AcidPour remain undisclosed. Users and organizations are advised to enhance cybersecurity measures and educate on phishing and malware threats.

Source: New AcidRain Linux Malware Variant โ€œAcidPourโ€ Found Targeting Ukraine

New AcidRain Linux Malware Variant "AcidPour" Targeting Ukraine

Follow us on Twitter (X) @Hackread - Facebook @ /Hackread

Hackread - Latest Cybersecurity, Tech, Crypto & Hacking News

"๐Ÿ” Unveiling Sandman APT: The Silent Menace Targeting Global Telcos ๐ŸŽฏ"

SentinelLabs has unearthed a new threat actor dubbed Sandman APT, primarily targeting telecommunication providers across the Middle East, Western Europe, and South Asia. This enigmatic group employs a novel modular backdoor named LuaDream, utilizing the LuaJIT platform, a rarity in the threat landscape. The meticulous movements and minimal engagements hint at a strategic approach to minimize detection risks. The LuaDream malware, a well-orchestrated and actively developed project, is designed for system and user info exfiltration, paving the way for precision attacks. The intriguing part? The attribution remains elusive, hinting at a private contractor or a mercenary group akin to Metador. The activities observed are espionage-driven, with a pronounced focus on telcos due to the sensitive data they harbor. The meticulous design of LuaDream showcases the continuous innovation in the cyber espionage realm, urging for a collaborative effort within the threat intelligence community to navigate the shadows of the threat landscape.

Source: SentinelOne Labs

Tags: #SandmanAPT #LuaDream #TelecomSecurity #CyberEspionage #ThreatActor #CyberSecurity #LuaJIT #SentinelLabs #APT ๐ŸŒ๐Ÿ”๐ŸŽฏ

Indicators of Compromise (IoCs):

  • Domains: mode.encagil[.]com, ssl.explorecell[.]com
  • File Paths: %ProgramData%\FaxConfig, %ProgramData%\FaxLib
  • SHA1:
    • fax.dat: 1cd0a3dd6354a3d4a29226f5580f8a51ec3837d4
    • fax.Application: 27894955aaf082a606337ebe29d263263be52154
    • ualapi.dll: 5302c39764922f17e4bc14f589fa45408f8a5089
    • fax.cache: 77e00e3067f23df10196412f231e80cec41c5253
    • UpdateCheck.dll: b9ea189e2420a29978e4dc73d8d2fd801f6a0db2
    • updater.ver: fb1c6a23e8e0693194a365619b388b09155c2183
    • fax.module: ff2802cdbc40d2ef3585357b7e6947d42b875884

Author: Aleksandar Milenkoski, a seasoned threat researcher at SentinelLabs, has meticulously dissected the activities of Sandman APT, shedding light on the LuaDream backdoor. His expertise in reverse engineering and malware research is evident in the detailed analysis provided.

Sandman APT | A Mystery Group Targeting Telcos with a LuaJIT Toolkit

Sophisticated threat actor deploys high-end malware utilizing the LuaJIT platform to backdoor telcos in Europe, Middle East and South Asia.

SentinelOne

"๐Ÿ”ฅ CapraTube Alert! Transparent Tribe's Sneaky Move ๐Ÿ“บ๐Ÿ“ฒ"

Transparent Tribe, a suspected Pakistani actor, has unveiled CapraTube, a deceptive Android application that mimics YouTube. SentinelLabs discovered three Android application packages (APKs) linked to Transparent Tribe's CapraRAT mobile remote access trojan (RAT). These apps give the illusion of being YouTube but are far less feature-rich than the genuine Android YouTube app.

CapraRAT is a potent tool, granting attackers control over vast amounts of data on infected Android devices. This RAT has been used for surveillance against targets related to the disputed Kashmir region and human rights activists focusing on Pakistan. The group distributes these Android apps outside the Google Play Store, using self-hosted websites and social engineering to lure users into installing weaponized applications.

In 2023, the group spread CapraRAT Android apps disguised as a dating service that carried out spyware activities. One of the newly identified APKs connects to a YouTube channel owned by Piya Sharma, suggesting the actor continues to employ romance-based social engineering tactics.

Key features of CapraRAT include:

  • Recording via microphone, front & rear cameras ๐ŸŽฅ
  • Collecting SMS, multimedia message contents, call logs ๐Ÿ“ž
  • Sending SMS messages, blocking incoming SMS ๐Ÿ“ฉ
  • Initiating phone calls ๐Ÿ“ฒ
  • Taking screen captures ๐Ÿ–ผ๏ธ
  • Overriding system settings like GPS & Network ๐Ÿ›ฐ๏ธ
  • Modifying files on the phone's filesystem ๐Ÿ“

For those in the India and Pakistan regions linked to diplomatic, military, or activist matters, it's crucial to be cautious of this actor and threat. Always be wary of apps outside the Google Play store and evaluate the permissions they request.

Source: SentinelOne Labs

Tags: #CapraTube #TransparentTribe #CapraRAT #CyberSecurity #AndroidMalware #SentinelLabs #MobileSecurity #APT ๐ŸŒ๐Ÿ”๐Ÿ“ฑ

Author: Alex Delamotte.

CapraTube | Transparent Tribeโ€™s CapraRAT Mimics YouTube to Hijack Android Phones

Pakistan-aligned threat actor weaponizes fake YouTube apps on the Android platform to deliver mobile remote access trojan spyware.

SentinelOne

๐Ÿ‘‰ New on #SentinelLabs! .NET malware loader, dubbed MalVirt, is being distributed through malvertising are using obfuscated virtualization for anti-analysis and evasion in an ongoing campaign. By @milenkowski and @hegel

https://www.sentinelone.com/labs/malvirt-net-virtualization-thrives-in-malvertising-attacks/

MalVirt | .NET Virtualization Thrives in Malvertising Attacks

.NET malware loaders distributed through malvertising are using obfuscated virtualization for anti-analysis and evasion in an ongoing campaign.

SentinelOne

๐Ÿ‡จ๐Ÿ‡ณ New on #SentinelLabs: Cluster of attacks in East Asia, DragonSpark uses open-source tool #SparkRAT & malware evading detection through #Golang source code interpretation. By
@milenkowski ๐Ÿ‘‡โ€‹

https://www.sentinelone.com/labs/dragonspark-attacks-evade-detection-with-sparkrat-and-golang-source-code-interpretation/

DragonSpark | Attacks Evade Detection with SparkRAT and Golang Source Code Interpretation

A cluster of attacks uses a novel technique, Golang source code interpretation, to avoid detection while also deploying a little-known tool called SparkRAT.

SentinelOne

๐Ÿ”ฅ New on #SentinelLabs! #NoName057(16) group carries #DDoS attacks on ๐Ÿ‡บ๐Ÿ‡ฆ Ukraine, #NATO organizations, & other government orgs.

@LabsSentinel has identified #Telegram channels, a #DDoS payment program, & a toolkit on #GitHub. By @hegel & @milenkowski ๐Ÿ‘‡โ€‹

https://s1.ai/noname0

NoName057(16) - The Pro-Russian Hacktivist Group Targeting NATO

In the name of Russia's war in Ukraine, NoName057(16) abuses GitHub and Telegram in an ongoing campaign to disrupt NATO's critical infrastructure.

SentinelOne