As far as exploiting unpatched Log4j systems to target Israeli entities are concerned, the Iranian state-sponsored threat actors leave no stone unturned to exploit these vulnerabilities, indicating that there is still a long tail for fixing this vulnerability.
It is believed that the group behind the latest set of activities has been identified as MuddyWater, an umbrella threat group. The organization has connections with Iran’s intelligence apparatus, MOIS.
As a distinctive aspect of the attacks, the SysAid Server instances used in the initial attack remained unsecured against the Log4Shell vulnerability. In this regard, the actors have departed from their traditional pattern of compromising target environments by leveraging VMware applications.
Mercury uses both custom and well-known hacking tools, as well as integrated operating system tools, to set up a hands-on keyboard attack, once it has gained access to the target organization.
Once the malware begins to establish persistence, it dumps credentials and moves throughout the organization using both custom and well-known hacking tools.
These are some of the most common techniques used by Mercury:-
During the period from July 23 to July 25, 2022, Microsoft’s threat intelligence team observed a number of attacks conducted by foreign entities.
Reconnaissance is the primary function of most commands. This is done by downloading the actor’s tool for lateral movement and persistence through one encoded PowerShell script.
In the aftermath of the successful compromise, it is said that web shells were deployed to allow commands to be executed through the web. A lateral movement would then be possible, which would assist the actor in the process of reconnaissance, persistence, credential theft, etc.
A remote monitoring and management tool called eHorus is also used for C2 communications during intrusions, along with a reverse-tunneling tool called Ligolo, which is the tool of choice for adversaries for reverse tunneling communications.
Here below we have mentioned the commands that are executed:-
Here below we have mentioned all the mitigations provided by the security experts:-
Secure Azure AD Conditional Access – Download Free White Paper
The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has been…
A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government, defense,…
Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency of…
In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working in…
The DragonForce ransomware group has launched a significant cyberattack on critical infrastructure in Saudi Arabia,…
In a concerning development, cybersecurity researchers at Trellix have uncovered a sophisticated malware campaign that…