Friday, November 22, 2024
HomeEmail SecurityA New Spyware Campaign Attack Industrial Enterprises To Steal Corporate Credentials

A New Spyware Campaign Attack Industrial Enterprises To Steal Corporate Credentials

Published on

Several spyware campaigns have been discovered recently by the security researchers at Kaspersky Labs in which the industrial enterprises were targeted by the threat actors to steal corporate credentials and resell them.

To evade detection, the threat actors use different types of spyware tools and deploy them for a very restricted time interval, as doing so will create complexity. 

The attackers use the following commodity malware in their attacks:-

- Advertisement - SIEM as a Service
  • AgentTesla/Origin Logger
  • HawkEye
  • Noon/Formbook
  • Masslogger
  • Snake Keylogger
  • Azorult
  • Lokibot

Anomalous Attacks

During the investigation, the security experts of Kaspersky Labs have dubbed this series of attacks as “Anomalous.” 

But why do they call these attacks “Anomalous”? As compared to other general or typical attacks, these attacks are quite short-lived in nature, and for this reason, they dubbed this Anomalous.

Other general spyware campaigns last for several months or even years, while the anomalous attacks remain active for around 25 days.

In these campaigns, the threat actors have targeted a very less number of systems that are around below 100. While in industrial environments, the integrated computer systems count starts from 200, which means the count of attacked systems is half.

To exfiltrate data from the compromised systems and send them to the actor-controlled C2 server, they use an SMTP-based communication protocol. 

In most standard spyware campaigns for C2 communication, HTTPS is used since SMTP is used for data theft and it’s a one-way channel.

Stealing credentials

In the company’s network to move laterally and infiltrate deeper in the network, the threat actors use the employee credentials that are stolen.

Here as C2 servers, the attackers use the compromised corporate mailboxes in previous attacks, and they do so to initiate new attacks.

During the analysis, more than 2000 corporate emails accounts were identified that were abused by the threat actors, and not only that, along with 2000, they have also discovered another 7000 compromised email accounts.

Marketplaces

In total, more than 25 different marketplaces were discovered where the threat actors used to sell the stolen data gathered from the campaigns.

In these marketplaces, the sellers offer several services like:-

  • RDP
  • SMTP
  • SSH
  • cPanel
  • Email accounts
  • Malware
  • Fraud schemes
  • Samples of emails
  • Webpages for social engineering

However, it has been reported that more than 50000 compromised RDP accounts were sold, in which 1954 accounts belonged to the industrial companies.

Recommendations

  • Implement two-factor authentication.
  • Ensure that all the endpoints, both on IT and OT networks, are protected.
  • Train all the personnel to handle their incoming emails securely.
  • Regularly check spam folders.
  • Use sandbox solutions.
  • Always scan the email attachments before downloading them.

So, these are the recommendations that are provided by the analysts, and they have strongly recommended users follow them strictly.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates

Latest articles

240+ Domains Used By PhaaS Platform ONNX Seized by Microsoft

Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by...

Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor

The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in...

Earth Kasha Upgraded Their Arsenal With New Tactics To Attack Organizations

Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to...

Raspberry Robin Employs TOR Network For C2 Servers Communication

Raspberry Robin, a stealthy malware discovered in 2021, leverages advanced obfuscation techniques to evade...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor

The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in...

Earth Kasha Upgraded Their Arsenal With New Tactics To Attack Organizations

Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to...

Raspberry Robin Employs TOR Network For C2 Servers Communication

Raspberry Robin, a stealthy malware discovered in 2021, leverages advanced obfuscation techniques to evade...