Wednesday, June 7, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Transparent Tribe APT Hits Indian Education Sector

Researcher by Researcher
April 14, 2023
in Cybersecurity
0
Microsoft to Block Macros by Default in Office Apps
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Recent malicious documents sent by Transparent Tribe, which appear to target institutions in the Indian education sector, reveal that the Pakistan-linked threat group is experimenting with new techniques to stage and obfuscate its malware.

Transparent Tribe (also known as APT36), known for its campaigns centered around information theft and espionage, has been around since 2013 and has historically targeted Indian military and defense personnel, primarily with the CrimsonRAT malware. This prolific malware family, written in .NET, can be utilized by attackers to steal credentials from browsers, capture screenshots, collect antivirus software information and list the running processes, drives and directories from victim machines.

While not very sophisticated, Transparent Tribe has continuously changed its operational strategy. Researchers at Cisco Talos last year found evidence of the group expanding its victimology beyond the defense sector, for instance, to target institutions and students in the Indian education industry.

“Transparent Tribe is a highly motivated and persistent threat actor that regularly updates its malware arsenal, operational playbook, and targets,” said Aleksander Milenkoski, senior threat researcher with SentinelLabs, in a Thursday analysis. “Transparent Tribe’s constantly changing operational and targeting strategies require constant vigilance to mitigate the threat posed by the group.”

Researchers observed Transparent Tribe distributing education-themed malicious documents, purporting to be related to student assignments, as attachments to phishing emails. These malicious documents pave the way for CrimsonRAT using both Microsoft Office macros and OLE embedding, where the legitimate Office object linking and embedding (OLE) functionality is misused to trick victims into downloading malicious content. CrimsonRAT is then executed, disguised as an update process.

“Transparent Tribe is known to experiment with different malware staging techniques, which include distributing executables with embedded documents or documents that execute designated Crimson RAT loaders,” said Milenkoski. “The adoption of OLE embedding further highlights the group’s continuous experimentation with malware staging techniques.”

Researchers observed multiple CrimsonRAT variants with compilation timestamps between June and September 2022, reflecting the continuous development of the group’s implementation of the malware. These variants utilize various anti-analysis measures, such as delaying execution for a given time period. One CrimsonRAT variant was uncovered being obfuscated using the Eazfuscator obfuscator, while previous malware samples have been obfuscated via the Crypto obfuscator.

“Evidence suggests that the CrimsonRAT developers have patched the routine that evaluates the trial period of Eazfuscator to enable the execution of the malware after the trial period expires,” said Milenkoski.

The campaign is only the latest by Transparent Tribe, which in March was discovered distributing the Android CapraRAT backdoor via trojanized messaging and calling apps in order to exfiltrate sensitive data. The group has also made moves to expand the number of malware families that it leverages to include ReverseRAT and the ObliqueRAT Windows malware.



Source link

Related articles

CISA: North Korea-Backed Actors Using Maui Ransomware

North Korean Attackers Target Google Account Credentials

June 7, 2023
Sentra Raises $30 Million for DSPM Technology

KeePass Update Patches Vulnerability Exposing Master Password

June 6, 2023
Tags: APTEducationhitsIndiansectorTransparentTribe
Share76Tweet47

Related Posts

CISA: North Korea-Backed Actors Using Maui Ransomware

North Korean Attackers Target Google Account Credentials

June 7, 2023
0

North Korean threat group Kimsuky has recently launched a social engineering campaign against a number of experts specializing in North...

Sentra Raises $30 Million for DSPM Technology

KeePass Update Patches Vulnerability Exposing Master Password

June 6, 2023
0

Open source password manager KeePass was updated over the weekend to patch a vulnerability allowing attackers to retrieve the cleartext...

Zero-day MOVEit Transfer vulnerability exploited in the wild

Zero-day MOVEit Transfer vulnerability exploited in the wild

June 6, 2023
0

Shodan search engine results for internet-facing MOVEit instances. Image: Shodan The Cybersecurity & Infrastructure Security Agency has issued an alert...

New DDoS Attack Vector Abuses Content Filtering Systems

UNC4857 Exploits MOVEit Transfer Flaw in Data Extortion Attacks

June 6, 2023
0

A newly discovered threat campaign has been observed exploiting the recently uncovered, critical-severity MOVEit Transfer vulnerability in order to launch...

Sentra Raises $30 Million for DSPM Technology

Dozens of Malicious Extensions Found in Chrome Web Store

June 6, 2023
0

Security researchers recently identified more than 30 malicious extensions that had made their way into the Chrome web store, potentially...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Release date, price and more

Release date, price and more

June 7, 2023
CISA: North Korea-Backed Actors Using Maui Ransomware

North Korean Attackers Target Google Account Credentials

June 7, 2023
7 tips for spotting a fake mobile app

7 tips for spotting a fake mobile app

June 6, 2023
Sentra Raises $30 Million for DSPM Technology

KeePass Update Patches Vulnerability Exposing Master Password

June 6, 2023

Recent Posts

Release date, price and more

Release date, price and more

June 7, 2023
CISA: North Korea-Backed Actors Using Maui Ransomware

North Korean Attackers Target Google Account Credentials

June 7, 2023
7 tips for spotting a fake mobile app

7 tips for spotting a fake mobile app

June 6, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved