article thumbnail

FBI links the Diavol ransomware to the TrickBot gang

Security Affairs

Diavol encrypts files solely using an RSA encryption key, and its code is capable of prioritizing file types to encrypt based on a pre-configured list of extensions defined by the attacker. Diavol is associated with developers from the Trickbot Group, who are responsible for the Trickbot Banking Trojan.

article thumbnail

StripedFly: Perennially flying under the radar

SecureList

It comes equipped with a built-in TOR network tunnel for communication with command servers, along with update and delivery functionality through trusted services such as GitLab, GitHub, and Bitbucket, all using custom encrypted archives. The malware executable file is placed in /tmp directory with a random name.

Malware 106
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China-Linked APT15 group is using a previously undocumented backdoor

Security Affairs

Experts discovered that since December 2016, the APT15 group has been using the previously undocumented backdoor dubbed Okrum. We first detected Okrum, through ESET telemetry, in December 2016; it targeted diplomatic missions in Slovakia, Belgium, Chile, Guatemala and Brazil throughout 2017.” ” continues the report.

DNS 86
article thumbnail

FIN8-linked actor targets Citrix NetScaler systems

Security Affairs

The attackers obtained encrypted passwords from NetScaler ADC configuration files, and the decryption key was stored on the ADC appliance. The attackers attempted to verify outbound network connectivity with a ping command and executed host commands for a subnet-wide DNS lookup. Network-segmentation controls blocked this activity too.

VPN 103
article thumbnail

IT threat evolution Q3 2023

SecureList

For most implants, the threat actor uses similar implementations of DLL hijacking (often associated with ShadowPad malware) and memory injection techniques, along with the use of RC4 encryption to hide the payload and evade detection. libssl.dll or libcurl.dll was statically linked to implants to implement encrypted C2 communications.

Malware 90
article thumbnail

Overview of IoT threats in 2023

SecureList

Brute-force attacks on services that use SSH, a more advanced protocol that encrypts traffic, can yield similar outcomes. User files were encrypted, with the device’s interface displaying a ransom note demanding payment of 0.03 DNS changer Malicious actors may use IoT devices to target users who connect to them.

IoT 85
article thumbnail

OilRig APT group: the evolution of attack techniques over time

Security Affairs

group_a : from 2016 to August 2017 2. T1094) mainly developed using DNS resolutions (which is actually one of the main characteristic of the attacker group). They begun development by introducing crafted communication protocol over DNS and later they added, to such a layer, encoding and encryption self build protocols.