Monday, November 25, 2024
Homecyber securityIran Hacking Group Used Open Source Multi-platform PupyRAT to Attack Energy Sector...

Iran Hacking Group Used Open Source Multi-platform PupyRAT to Attack Energy Sector Organization

Published on

PupyRAT is a cross-platform (Windows, Linux, OSX, Android) is a remote administration and post-exploitation tool.

It was written in python, acts as a backdoor, allows an attacker to create remote command shells, steal password credentials, log keystrokes, steal files, and to record webcams.

The tool is intended for using red-team purposes, but the Iranian hacking groups APT33 (Elfin, Magic Hound, HOLMIUM) and COBALT GYPSY (which overlaps with APT34/OilRig), made heavy use of the tool.

- Advertisement - SIEM as a Service

Shifted focus on Attack Energy Sector Organization

These groups are known for targeting IT sectors in the United States, Europe, and elsewhere, now they have to target the physical control systems in electric utilities, manufacturing, and oil refineries.

Security researchers from Recorded Future observed a European energy sector organization Email server communicating with the PupyRAT command and control (C2) server between late November 2019 until at least January 5, 2020.

They further analyze the metadata which confirms the compromise, “we assess that the high volume and repeated communications from the targeted mail server to a PupyRAT C2 are sufficient to indicate a likely intrusion.”

Researchers are unable to confirm which Iranian hacking group used PupyRAT to attack the mail server of the high-value critical infrastructure organization.

Iranian groups know for targeting a wide range of industries in the U.S. and Europe, this recent attack shows the increasing rate of attacks targeting energy sector industrial control software.

Last year North Korean Hackers Attack Indian Nuclear Power Plant [KKNPP] Using Dtrack Malware and they have managed to compromise domain controller.

The Dtrack malware designed to spy on the victim machines, it extracts sensitive data from victim machines.

Mitigation Suggested

  • Monitor for login attempts
  • Enable multi-factor authentication
  • Use of password manager
  • Analyzing connection log data

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor

The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in...