Fancy Bear APT Uses New Cannon Trojan to Target Government Entities
#1
Quote:The advanced persistent threat group Fancy Bear continues its attacks on government entities all around the world using a two-stage payload malware campaign dropping the Zebroy Trojan and a new Trojan dubbed Cannon as discovered by Palo Alto Networks's Unit 42.

The malicious emails distributed through Fancy Bear's new malware campaign will drop the Zebrocy Trojan as a first stage payload and a new Trojan named Cannon as a second stage payload.

The email-based communication channel used by Cannon to communicate with its command-and-control (C&C) servers is the most exciting behavior observed by Unit 42 while analyzing the new Trojan.

Moreover, using emails to communicate with the puppet masters controlling it might allow Cannon to avoid detection since most malware these days make use of HTTP and HTTPS communication channels.

As discovered by Unit 42, "The weaponized documents targeted several government entities around the globe, including North America, Europe, and a former USSR state."

Source: https://news.softpedia.com/news/fancy-be...3891.shtml
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
AdGuard Browser Extension 5.2.77 (MV3 st...
AdGuard Browser Ex...harlan4096 — 07:22
New types of attacks on AI-powered assis...
A close look at at...harlan4096 — 07:21
Apple patches a zero-day threat in older...
Apple has released...harlan4096 — 07:19
XYplorer
What's new in Rele...Kool — 15:21
Free Download Manager 6.30.0.6459
Changes in 6.30.0....harlan4096 — 13:51

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (38)fapedDow
avatar (48)pohudidere
avatar (38)eqiduseb
avatar (49)skepwHug
avatar (38)RicardoGoase
avatar (43)Denpokhew
avatar (35)azidony
avatar (40)maskbSleew

[-]
Online Staff
There are no staff members currently online.

>