Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Cyberattack Group ‘Awaken Likho’ Targets Russian Authorities with Superior Instruments

Oct 08, 2024Ravie LakshmananCyber Risk / APT Assault

Russian authorities businesses and industrial entities are the goal of an ongoing exercise cluster dubbed Awaken Likho.

“The attackers now prefer using the agent for the legitimate MeshCentral platform instead of the UltraVNC module, which they had previously used to gain remote access to systems,” Kaspersky stated, detailing a brand new marketing campaign that started in June 2024 and continued not less than till August.

The Russian cybersecurity firm stated the marketing campaign primarily focused Russian authorities businesses, their contractors, and industrial enterprises.

Cybersecurity

Awaken Likho, additionally tracked as Core Werewolf and PseudoGamaredon, was first documented by BI.ZONE in June 2023 in reference to cyber assaults directed in opposition to protection and significant infrastructure sectors. The group is believed to be lively since not less than August 2021.

The spear-phishing assaults contain distributing malicious executables disguised as Microsoft Phrase or PDF paperwork by assigning them double extensions like “doc.exe,” “.docx.exe,” or “.pdf.exe,” in order that solely the .docx and .pdf parts of the extension present up for customers.

Opening these information, nonetheless, has been discovered to set off the set up of UltraVNC, thereby permitting the risk actors to achieve full management of the compromised hosts.

Different assaults mounted by Core Werewolf have additionally singled out a Russian navy base in Armenia in addition to a Russian analysis institute engaged in weapons improvement, per findings from F.A.C.C.T. earlier this Could.

One notable change noticed in these situations considerations using a self-extracting archive (SFX) to facilitate the covert set up of UltraVNC whereas displaying an innocuous lure doc to the targets.

Cybersecurity

The newest assault chain found by Kaspersky additionally depends on an SFX archive file created utilizing 7-Zip that, when opened, triggers the execution of a file named “MicrosoftStores.exe,” which then unpacks an AutoIt script to finally run the open-source MeshAgent distant administration software.

“These actions allow the APT to persist in the system: the attackers create a scheduled task that runs a command file, which, in turn, launches MeshAgent to establish a connection with the MeshCentral server,” Kaspersky stated.

Discovered this text attention-grabbing? Observe us on Twitter and LinkedIn to learn extra unique content material we publish.

Recent articles

Microsoft 365 customers hit by random product deactivation errors

​Microsoft is investigating a recognized challenge...

UAC-0125 Abuses Cloudflare Staff to Distribute Malware Disguised as Military+ App

Dec 19, 2024Ravie LakshmananDisinformation / Malware The Laptop Emergency Response...

Dutch DPA Fines Netflix €4.75 Million for GDPR Violations Over Knowledge Transparency

Dec 19, 2024Ravie LakshmananPrivateness / Knowledge Safety The Dutch Knowledge...