Monday, March 3, 2025
HomeComputer Securityaka APT33 Hackers Attacked 50 Organizations by Launching a Variety of...

aka APT33 Hackers Attacked 50 Organizations by Launching a Variety of Malware & Free Hacking Tools

Published on

SIEM as a Service

Follow Us on Google News

Relentless espionage Group also called as aka APT33 (Elfin) targeting various organization in Saudi Arabia and United States by deploying a variety of malware in their network.

Aka APT33 group specifically targeting corporate networks and it compromised around 50 organizations in different countries since 2015.

Cybercriminals scanning the vulnerable websites of a specific target, later used for either command and control server or malware attacks if the website will be compromised successfully.

so far attackers compromised the wide range of targets including, governments along with organizations in the research, chemical, engineering, manufacturing, consulting, finance, telecoms, and several other sectors.

Aka APT33 group mainly focused on Saudi Arabia, with the 42% of attack since 2016 and its compromised 18 organization in the U.S alone over the past three years.

In this case, Elfin targeted organization including engineering, chemical, research, energy consultancy, finance, IT, and healthcare sectors in the U.S alone.

Exploiting the Vulnerabilities

A very recent campaign, Elfin hackers performed various attempt to exploit the WinRAR vulnerability, and it was mainly used against one target in the chemical sector in Saudi Arabia.

In this case, successfully exploited this vulnerability allow attackers take the complete control of vulnerable windows computer and install any file on the system.

Attackers send spear phishing emails to the target and attempt to exploit this WinRAR vulnerability.

Open-source hacking Tools & Custom Malware

During the attack, Elfin Use the variety of open source hacking tools, custom malware, commodity malware to compromise the different target.

In this custom malware family includes Notestuk (Backdoor.Notestuk) , a malware to open the backdoor and gathering the information, Stonedrill(Trojan.Stonedrill) , a custom malware capable of opening a backdoor on an infected computer and downloading additional files.

Elfin APT also makes frequent use of a number of publicly available hacking tools, including:

  • LaZagne (SecurityRisk.LaZagne): A login/password retrieval tool
  • Mimikatz (Hacktool.Mimikatz): Tool designed to steal credentials
  • Gpppassword: Tool used to obtain and decrypt Group Policy Preferences (GPP) passwords
  • SniffPass (SniffPass): Tool designed to steal passwords by sniffing network traffic

Also, many commodity malware tools were used for these attacks and themalware available for purchase on the cyber underground. including,

Learn: Malware Analysis – Advance Malware Analyst Bundle Course

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Google Launches Shielded Email to Keep Your Address Hidden from Apps

Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps...

Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware

Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage...

JavaGhost: Exploiting Amazon IAM Permissions for Phishing Attacks

Unit 42 researchers have observed a threat actor group known as JavaGhost exploiting misconfigurations...

New Poco RAT Via Weaponized PDF Attacking Users to Capture Sensitive Data

A new variant of malware, dubbed "Poco RAT," has emerged as a potent espionage...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Google Launches Shielded Email to Keep Your Address Hidden from Apps

Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps...

Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware

Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage...

JavaGhost: Exploiting Amazon IAM Permissions for Phishing Attacks

Unit 42 researchers have observed a threat actor group known as JavaGhost exploiting misconfigurations...