|

Shadowpad, PlugX, China Chopper, Stowaway RAT

TLP TLP TLP CLEAR Author David Deflache, Sebastien Tricaud Summary This week, we share data from another attack being exploited. In mid-Autumn 2021, Kaspersky experts uncovered a ShadowPad malware campaign targeting a national telecom company in Pakistan. The attack, presumed to have begun in winter 2021, exploited MS Exchange vulnerability (CVE-2021-26855) to install a Cobalt…

|

GhostEmperor

TLP TLP TLP CLEAR Author David Deflache, Sebastien Tricaud Summary This week, we share data from another attack being exploited. In August 2022, analysts uncovered a cyber attack on a government-run Indonesian company by the APT group GhostEmperor. Known since 2021, GhostEmperor specializes in cyberespionage across sectors, employing tactics such as phishing, software exploits, and…

|

Anydesk Installation Traces

TLP TLP TLP CLEAR Author Sebastien Tricaud Summary This scenario automates the download and installation of AnyDesk, a remote desktop software, on a Windows system. It begins by resolving the IP address of the AnyDesk download server through DNS resolution. Subsequently, it simulates a Windows environment for an HTTP request, fetches the AnyDesk.exe file from…

|

Volt Typhoon

TLP TLP TLP CLEAR Author Jordi M. Lobo Summary Microsoft has uncovered a stealthy and targeted malicious campaign led by Volt Typhoon, a state-sponsored actor from China, with a focus on post-compromise credential access and network system discovery. Their primary targets are critical infrastructure organizations in the United States, including sectors such as communications, manufacturing,…

End of content

End of content