article thumbnail

Russia-linked InvisiMole APT targets state organizations of Ukraine

Security Affairs

Then the backdoor contacts the command-and-control (C2) server to downloads and executes other malicious payloads, including the TunnelMole, malware that abuses the DNS protocol to establish a tunnel for malicious purposes, and RC2FM and RC2CL. The LoadEdge backdoor maintains persistence through the Windows registry.

Spyware 90
article thumbnail

InvisiMole group targets military sector and diplomatic missions in Eastern Europe

Security Affairs

The group was first spotted by ESET in 2018, when the experts detected a sophisticated piece of spyware, tracked as InvisiMole, used in targeted attacks in Russia and Ukraine in the previous five years. Experts also observed attackers using a DNS downloader that was designed for long-term, covert access to the target machine.

DNS 85
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Canadian Police Raid ‘Orcus RAT’ Author

Krebs on Security

As KrebsOnSecurity noted in 2016 , in conjunction with his RAT Rezvesz also sold and marketed a bulletproof “dynamic DNS service” that promised not to keep any records of customer activity. ” “I am not your A-typical computer geek, Brian,” he wrote in a 2018 email. “I

article thumbnail

Security Affairs newsletter Round 177 – News of the week

Security Affairs

Paper Copy. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->.

Spyware 42
article thumbnail

Is Your Small Business Safe Against Cyber Attacks?

CyberSecurity Insiders

Back in 2018, almost two-thirds of the small businesses suffered from cyber security attacks. . Make sure all devices and computers at your office have installed anti-virus, and anti-spyware as these are connected to the network, offering a gateway to hackers. Install hardware firewalls for the maximum level of network security. .

article thumbnail

IT threat evolution in Q2 2023

SecureList

Since 2018, Lazarus has persistently targeted crypto-currency-related businesses for a long time, using malicious Word documents and themes related to the crypto-currency business to lure potential targets. Using a number of vulnerabilities in iOS, the attachment is executed and installs spyware.

Malware 73
article thumbnail

IT threat evolution Q3 2023

SecureList

However, they included an additional module that constantly monitored the messenger and sent data to the spyware creator’s C2 server. Upon startup, this backdoor makes a type A DNS request for the <hex-encoded 20-byte string> u.fdmpkg[.]org org domain. We also published a report on a new version of the Lumma stealer.

Malware 91