Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
New hacker group targets airlines, refugees with well worn tools
#1
A newly discovered threat group is targeting the International Air Transport Association (IATA) members, airlines and refugees to Canada. Shown here, a regional jet from Russian airline NordStar, a IATA member. (IATA)
 
MalwareBytes reports a newly discovered threat group targeting the International Air Transport Association (IATA) members, [color=var(--theme-link_a)]airlines and refugees to Canada.
 
The group, nicknamed LazyScripter, uses an uncommon amount of publicly available tools in its efforts.
“What was interesting about this actor is how much it is really relying on open source and commercially available toolset to operate,” Hossein Jazi, senior threat intelligence analyst at MalwareBytes, told SC Media.
 
LazyScriptor was first discovered in December, but appears to have been active since 2018. It uses .pdf files linking to malware stored on GitHub, bespoke loader programs to open a variety of well-known commodity malware.
 
Between 2018 and 2019, the group installed Powershell Empire on victims using a loader MalwareBytes is calling Emploader. Recently it switched to Octopus and Koadic installed with a loader Malwarebytes is calling Kocktopus.
 
The group used job and IATA related lures, as well as fake updates; immigration, tourism and visa related documents; and COVID-19 information to infect victims.
“In terms of attribution. It’s hard to really attribute this group to any known groups,” said Jazi. “We did a comparison; while we found some similarities between this actor and actors such as MuddyWater, OilRig, and APT 28, there are big differences” as well.
 
The connections to OilRig and APT 28 are largely in their use of similar commodity malware, which is not a strong connection. While Muddywater is the most similar, it is historically more adept at targeting victims, and uses custom tools LazyScripter has yet to utilize. OilRig and MuddyWater are both suspected to be Iranian groups while APT 28 is believed to be Russian.
 
A list of indicators of compromise is available on the MalwareBytes website. But Jazi also said relevant defenders should be on the lookout for GitHub traffic.
[/color]


Source
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  (Bitdefender ) 2024 Cybersecurity Forecast: Ransomware's New Tactics and Targets mrtrout 0 862 01-05-2024 , 08:49 PM
Last Post: mrtrout
  The hacker group Anonymous has declared cyber warfare on Russia Bjyda 2 1,698 02-26-2022 , 04:08 PM
Last Post: Bjyda
  Hacker group claims to steal 3 million users’ data from Israeli hiking websites mrtrout 0 1,025 01-22-2022 , 11:03 PM
Last Post: mrtrout
  Apple suing Israeli hacker-for-hire company NSO Group mrtrout 0 689 11-24-2021 , 04:21 AM
Last Post: mrtrout
  Mozi IoT Botnet Now Also Targets Netgear, Huawei, and ZTE Network Gateways mrtrout 0 854 08-21-2021 , 10:35 PM
Last Post: mrtrout

Forum Jump:


Users browsing this thread: 1 Guest(s)