Remove a-custom-malware-is-used-by-nobelium-apt-to-backdoor-windows-domains
article thumbnail

A Custom Malware Is Used by Nobelium APT to Backdoor Windows Domains

Heimadal Security

The Nobelium hacking group is using a new malware to deploy additional payloads and steal sensitive info from the Active Directory Federation Services (AD FS) servers. It is classified as an advanced persistent threat APT29 by the US […]. It is classified as an advanced persistent threat APT29 by the US […].

Malware 115
article thumbnail

APT trends report Q3 2021

SecureList

For more than four years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. The evidence suggests that the threat actor behind the attack, DarkHalo (aka Nobelium), had spent six months inside OrionIT’s networks to perfect their attack.

Malware 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

APT trends report Q2 2021

SecureList

For more than four years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. Moreover, we saw ShadowPad detections coincide with FourteenHi variant infections, possibly hinting at a shared operator between these two malware families.

Malware 140
article thumbnail

Tomiris called, they want their Turla malware back

SecureList

Our initial report described links between a Tomiris Golang implant and SUNSHUTTLE (which has been associated to NOBELIUM / APT29/TheDukes ) as well as Kazuar (which has been associated to Turla ); however, interpreting these connections proved difficult. Actor profile Tomiris focuses on intelligence gathering in Central Asia.

Malware 89