TeamViewer’s popularity and remote access capabilities make it an attractive target for those seeking to compromise systems for their gain.
Threat actors target TeamViewer for their illicit purposes because it is a widely used remote desktop software with potential security weaknesses.
Exploiting vulnerabilities in TeamViewer can provide unauthorized access to systems and sensitive data, enabling cybercriminals to carry out various malicious activities, such as data theft, financial fraud, or even using compromised systems to launch attacks on other targets.
In late 2022, QiAnXin Threat Intelligence Center identified a new threat actor group using fake software download sites with manipulated search rankings to distribute unofficial but seemingly valid installation packages created with Inno Setup.
Attribution was challenging due to the attackers’ complex attack chain and manual operations.
In mid-2023, TeamViewer’s DLL Sideloading was delivered via SFTP, hinting at a connection to the attacks on security researchers in 2021.
The execution chain focuses on SSH reverse tunnels, leveraging OpenSSH to bypass EDR endpoint detection.
Attackers employed sftp-server.exe to deliver the TeamViewer hijacking component, revealing the use of MINEBRIDGE RAT.
AnyDesk and PsExec were also used for lateral propagation, with data decryption occurring within the victim’s user context.
In total, four legitimate signatures were used in this phishing operation, some still valid in the report, with an enigmatic use of Amadey Trojan.
Researchers uncovered a new MINEBRIDGE RAT variant with LLVM obfuscation, removing old C&C instructions.
The sample retrieves a DLL from the server to execute PowerShell commands for SSH component download, consistent with previous scripts.
The group has been active since 2021 based on domain registration times. They used Cloudflare CDN to obscure their IP, but few OSINT reports on MINEBRIDGE made tracking challenging.
QiAnXin’s data shows that the malicious domains communicated with both corporate dedicated lines and home broadband in mainland China during their Cloudflare CDN phase.
The enterprises involved were in the following sectors:-
Recent findings suggest Storm-0978 (RomCom), TA505, and MINEBRIDGE have strong connections, possibly indicating shared activities beyond economic motivations.
Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Take advantage of the free trial to ensure 100% security.
The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS devices.…
White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch Experts…
Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan exploits…
The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on organizations…
Google has updated its Chrome browser, addressing critical vulnerabilities that posed potential risks to millions…
WrnRAT is a new malware attack that cybercriminals have deployed by using popular gambling games…