Connect with us

Hi, what are you looking for?


Hack-for-Hire Group Financial Sector Targets From 2012

Hack-for-Hire Group Financial Sector Targets From 2012


A hack-for-hire group has been focusing on organizations within the monetary sector since 2012, for cyber-espionage functions, Kaspersky’s safety researchers reveal.

Dubbed DeathStalker, the “mercenary” superior persistent menace (APT) has been focusing on organizations worldwide, primarily specializing in legislation companies and monetary entities. The adversary was noticed shortly adapting to make sure the success of assaults, and to replace their software program at a quick tempo.

Monitoring the hacking group since 2018, Kaspersky was in a position to hyperlink its exercise to the Powersing, Evilnum and Janicab malware households, thus suggesting that the menace actor might need been lively since not less than 2012, but it continues to develop its toolset.

In latest assaults involving the PowerShell-based implant referred to as Powersing, spear-phishing emails carrying an archive with a malicious LNK file inside have been used because the preliminary vector. The shortcut information have been designed to launch a convoluted sequence that finally ends in arbitrary code being executed on the sufferer’s machine.

The Powersing implant was designed to periodically seize screenshots of the sufferer’s system and ship them to the command and management (C&C) server, and to execute arbitrary PowerShell scripts obtained from the C&C. Offering a stealthy foothold onto the sufferer’s community, the implant permits attackers to put in further instruments.

DeathStalker, Kaspersky reveals, used public companies (together with Google+, Imgur, Reddit, ShockChan, Tumblr, Twitter, YouTube, and WordPress) as lifeless drop resolvers, storing information by way of feedback, descriptions, public posts, person profiles, and the like.

Powersing connects to those lifeless drop resolvers and retrieves the saved info, which is decoded and finally transformed into an IP tackle that the malware makes use of to connect with the actual C&C server. By following messages on lifeless drop resolvers, the researchers concluded that the malware has been in use since not less than August 2017.

“Counting on well-known public companies permits cybercriminals to mix preliminary backdoor communications into reliable community visitors. It additionally limits what defenders can do to hinder their operations, as these platforms can’t usually be blacklisted on the firm degree, and getting content material taken down from them could be a troublesome and prolonged course of,” Kaspersky notes.

The safety researchers additionally recognized a connection between the Powersing implant and the Janicab malware household, which was beforehand mentioned publicly, with its oldest samples courting way back to 2012.

The preliminary an infection phases are equivalent for each malware households. Janicab makes use of YouTube as a lifeless drop resolver and packs options found in Powersing as properly, and likewise employs community visitors just like that of the newer malware household. Furthermore, the checklist of blacklisted VM MAC addresses is similar for each.

Evilnum is one other malware household to make use of a LNK-based an infection chain and fetch C&C info from a lifeless drop resolver (GitHub), in addition to to seize screenshots which can be despatched to the C&C (albeit Evilnum has extra capabilities than Powersing) and to deal with gathering enterprise intelligence from its victims (that are from the fintech sector).

Kaspersky additionally recognized a sequence of code overlaps between latest Evilnum samples and Janicab, which additional means that the three malware households are associated. The hackers took benefit of the COVID-19 pandemic in latest assaults to ship each Janicab and Powersing.

DeathStalker’s victims are primarily from the monetary sector and so they embrace monetary expertise firms, legislation places of work, wealth consultancy companies, and extra. The menace actor was additionally noticed focusing on a diplomatic entity on one event.

Sufferer organizations, small to medium-sized companies, are situated in Argentina, China, Cyprus, India, Israel, Lebanon, Switzerland, Russia, Taiwan, Turkey, the UK and the United Arab Emirates. Victims are chosen both based mostly on perceived worth or based mostly on buyer requests.

Associated: Risk Actor Bought Entry to Networks of 135 Organizations

Associated: Evilnum Group Targets Fintech Firms in Europe

Associated: North Korean Risk Actors Acted as Hackers-for-Rent, Says U.S. Authorities

Hack-for-Hire Group Financial Sector Targets From 2012
Hack-for-Hire Group Financial Sector Targets From 2012
Hack-for-Hire Group Financial Sector Targets From 2012

Ionut Arghire is a world correspondent for SecurityWeek.

Earlier Columns by Ionut Arghire:
Hack-for-Hire Group Financial Sector Targets From 2012Tags:

cyber attacks on banks 2020,cyber attacks on banks in india,australian banks ddos extortion,cyber attacks on banks statistics,metro bank cyber attack,cyber attacks on financial institutions 2019

You May Also Like


The latest round of MITRE ATT&CK evaluations proved yet again that Microsoft customers can trust they are fully protected even in the face of...


On Thursday, April 23rd, 2020, Canonical Ltd, the makers of Ubuntu Linux distribution officially released the long-awaited Ubuntu 20.04 version code-named “Focal Fossa”, it...


As the robot process automation (RPA) market becomes more and more dynamic, more and more companies are trying to integrate RPA into their business...


One of the most discussed new features in Ubuntu 20.04 is the dark mode. You can install a dark theme in any version of...