Saturday, April 5, 2025
HomeBackdoorAPT15 Hackers Using Steganography Technique to Drop Okrum Backdoor Via PNG...

APT15 Hackers Using Steganography Technique to Drop Okrum Backdoor Via PNG File to Evade Detection

Published on

SIEM as a Service

Follow Us on Google News

Researchers discovered a previously unseen malware called Okrum that distributed from APT15 threat group via a hidden PNG file with steganography technique to evade detection.

APT15 threat group also known as Ke3chang has a long history of its malicious activities since 2010, and it was initially reported in 2013 during their campaign activity attack organization in Europe.

Okrum backdoor initially detected in December 2016 that targets various countries such as Slovakia, Belgium, Chile, Guatemala and Brazil and is believed to be operating out of China.

Okrum backdoor initially detected in December 2016 that targets various countries such as Slovakia, Belgium, Chile, Guatemala Brazil and is believed to be operating out of China.

The APT group continues to be active in 2019 to attack the same type of target but were using different malicious toolsets to compromise them.

Okrum has a similar modus operandi as previously documented Ke3chang (APT15)malware family with a basic set of backdoor commands.

Okrum Distribution and infection vector By APT15

Threat actors from APT15 hiding the okrum payload within a PNG file and infect the victim’s machine using steganography technique stay unnoticed and evade detection.

Attackers tried to hide malicious traffic with its C&C server within the normal traffic by registering the legitimate domain names.

Okrum backdoor installed and loaded by 2 different components which is frequently changed by malware authors to avoid detection.

According to ESET research, “Okrum is only equipped with basic backdoor commands, such as downloading and uploading files, executing files and shell commands. Most of the malicious activity has to be performed by typing shell commands manually, or by executing other tools and software”

“Researchers believe that the combination of simple backdoor and external tools fully accommodates their needs while being easier to develop, but it may also be an attempt to evade behavioral detection.”

Along with this, researchers discovered some of the external tools such as keylogger, tools for dumping passwords, or enumerating network sessions.

Based on the telemetry data, Threat actors employed various anti-emulation and anti-sandbox technique to avoid detection and it mainly targeting Slovakia, Belgium, Chile, Guatemala, and Brazil, Slovakia.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Also Read:

Chinese APT’s New Malware MirageFox Launch Cyber Attack on Government & Military Sectors

Hackers using steganography to Drop the Powload Malware & Hide Their Malvertising Traffic

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

Beware of Clickfix: ‘Fix Now’ and ‘Bot Verification’ Lures Deliver and Execute Malware

A sophisticated browser-based malware delivery method, dubbed ClickFix, has emerged as a significant threat...

DeepSeek-R1 Prompts Abused to Generate Advanced Malware and Phishing Sites

The release of DeepSeek-R1, a 671-billion-parameter large language model (LLM), has sparked significant interest...