Monday, December 4, 2023

Powerful APT Malware “Slingshot” Performs Highly Sophisticated Cyber Attack to Compromise Router

Cyber criminals performing a highly sophisticated attack using APT Malware called Slingshot to compromise routers and gain the administrator level access.

Slingshot is one of the powerful cyber threat actor that mainly targeting individuals and organization and the major victims belong to Africa and the Middle East.

Researchers identified a malicious library function injection technique in the virtual file system that is an indication of APT interaction in the network.

Attackers compromised the Mikrotik routers using this Slingshot APT that will provide a complete router access.

Slingshot  attacked 100 of victims who is located in Kenya, Yemen, Afghanistan, Libya, Congo, Jordan, Turkey, Iraq, Sudan, Somalia and Tanzania.

In mainly infected the many of individuals rather than an organisation but some of the  attack indication referrers to few of government institution in  Kenya and the Yemen.

Also Read:  Beware of FlawedAmmyy RAT that Steals Credentials and Record Audio Chat

How Slingshot APT Attack Works

Slingshot APT attack very powerful creation by its authors and it developed with very sophisticated techniques to compromise the victims  through a Windows exploit or compromised Mikrotik routers.

Initially victims runs the Winbox Loader software that downloads some DLLs by connecting to the router from routers file system which is already compromised and it contains malicious embedded code.

One of the DLL called “ipv4.dll” which is used to download other malicious components and run it into the users system.

According to kaspersky researchers, To run its code in kernel mode in the most recent versions of operating systems, that have Driver Signature Enforcement, Slingshot loads signed vulnerable drivers and runs its own code through their vulnerabilities. .

later Slingshot will load a malicious modules in both kernel mode(Cahnadr) and user mode(GollumApp) and these module will play a major role to performing an information gathering operation and exfiltrate the sensitive data.

Slingshot Also evade the security system and avoid detection by encrypting all strings and using a number of Anti-bug techniques.

After the complete infection, slingshot will collect the sensitive information such as screenshots, keyboard data, USB connections.

Since it have a kernel level access, slingsgot will collect all the relevant information it need such as credit card numbers, password hashes, social security account numbers etc.

Researchers haven’t seen Slingshot exploit any zero-days, but that doesn’t mean that it doesn’t – that part of a story is still unclear for us.  But it does exploit known vulnerabilities in drivers to pass executable code into kernel mode. Kaspersky said.Router


Latest articles

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own...

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles