Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Hacker-for-Hire StrongPity APT Going Global with its New Infrastructure
#1
Quote:StrongPity, an APT group active since at least 2012 and first publically reported in 2016, has mostly focused on countries like Italy and Belgium. However, it has now expanded its scope of attack across Northern Africa, Europe, Asia, and Canada as well.
Quick infoThe APT focuses on finding and exfiltrating data from infected machines and runs a series of fake websites that lure users with an array of software tools. These tools are trojanized versions of genuine applications.
  • The APT selectively targets victims using a predefined IP list. If a victim’s IP address matches the one in the installer’s configuration file, the group delivers a trojanized version of the application, otherwise a legitimate version.
  • Once installed, the malware triggers an exfiltration component that executes a file-searching mechanism tasked for looping via drives, looking for files with some specific extensions defined by attackers.
  • If found, the files are stored in a temporary (.ZIP) archive. Then, split into hidden (.SFT) encrypted files and sent to the C2 server. Finally, these files are deleted from the disk to hide any evidence of exfiltration.
  • The APT uses two types of servers - download servers that propagate the malicious installer used in the initial compromise of victims and C2 servers.
Hacker-for-hire groupsBesides StrongPity, there are several other hacker-for-hire mercenary groups that are actively offering their services and have been observed expanding their scope of attacks.
  • A hacker-for-hire group DeathStalker was observed using a new PowerShell backdoor in their attacks, in early-December.
  • CostaRicto was found operating a global espionage campaign on multiple continents.
ConclusionHackers-for-hire mercenaries are now becoming popular and many nation-states have been found using their services for espionage. Thus, experts suggest organizations stay protected by deploying web and email filters on the network, segmentation of any critical networks, and advising their employees to use legitimate software downloaded from official sources only.

Source: https://cyware.com/news/hacker-for-hire-...e-86298602
[-] The following 1 user says Thank You to DTinn8 for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Thunderbird Supernova 115.10.2
Thunderbird Supern...harlan4096 — 15:31
VirtualBox 7.0.18 Build 162988
Changes in 7.0.168...harlan4096 — 15:25
Emsisoft Anti-Malware 2024.5.0.12426
Changes in 2024.5....harlan4096 — 15:25
Microsoft introduces Passkeys support fo...
Microsoft is celeb...harlan4096 — 15:08
Mozilla blames recaptcha issue in Firefo...
Mozilla confirmed ...harlan4096 — 15:04

[-]
Birthdays
Today's Birthdays
avatar (42)nikitaxople
Upcoming Birthdays
avatar (26)akiratoriyama
avatar (46)Jerrycix
avatar (38)awedoli
avatar (80)WinRARHowTo
avatar (36)owysykan
avatar (47)beautgok
avatar (37)axuben
avatar (43)talsmanthago
avatar (29)mocetor
avatar (44)piomaibhaict
avatar (49)kingbfef
avatar (36)izenesiq
avatar (38)ihijudu
avatar (43)tiojusop
avatar (40)Damiennug
avatar (38)acoraxe
avatar (47)contjrat
avatar (39)axylisyb
avatar (42)tukrublape
avatar (39)iruqi
avatar (40)saitetib
avatar (34)ypasodiny
avatar (37)omapek
avatar (46)Geraldtuh
avatar (42)knigiJow
avatar (44)1stOnecal
avatar (48)Mirzojap
avatar (34)idilysaju
avatar (43)xclubDum
avatar (39)Stewartanilm
avatar (38)GregoryRog
avatar (43)mediumog
avatar (38)odukoromu
avatar (44)Joanna4589

[-]
Online Staff
There are no staff members currently online.

>