Welcome! Accelerate Your Discovery

Be a part of a committed society that is shaping the future of knowledge Search

Hack-for-Hire Group Targets Travel and Financial Entities with New Janicab Malware Variant

Home | Cybersecurity | S.I.S 17th December, 2022

0 Comment(s)

Image

Travel agencies have emerged as the target of a hack-for-hire group dubbed Evilnum as part of a broader campaign aimed at legal and financial investment institutions in the Middle East and Europe.

The attacks, which took place during 2020 and 2021 and likely went as far back as 2015, involved a revamped variant of a malware called Janicab that leverages a number of public services like WordPress and YouTube as dead drop resolvers, Kaspersky said in a technical report published this week.

Janicab infections comprise a diverse set of victims located in Egypt, Georgia, Saudi Arabia, the UAE, and the U.K. The development marks the first time legal organizations in Saudi Arabia have been targeted by this group.

Also tracked as DeathStalker, the threat actor is known to deploy backdoors like Janicab, Evilnum, Powering, and PowerPepper to exfiltrate confidential corporate information.

"Their interest in gathering sensitive business information leads us to believe that DeathStalker is a group of mercenaries offering hacking-for-hire services, or acting as some sort of information broker in financial circles," the Russian cybersecurity company noted in August 2020.

According to ESET, the hacking crew has a pattern of harvesting internal company presentations, software licenses, email credentials, and documents containing customer lists, investments, and trading operations.

Earlier this year, Zscaler and Proofpoint uncovered fresh attacks orchestrated by Evilnum that have been directed against companies in the crypto and fintech verticals since late 2021.

Hack-for-Hire Group










Kaspersky's analysis of the DeathStalker intrusions has revealed the use of an LNK-based dropper embedded inside a ZIP archive for initial access by means of a spear-phishing attack.

The lure attachment purports to be an industrial profile document related to power hydraulics that, when opened, leads to the deployment of the VBScript-based Janicab implant, which is capable of command execution and deploying more tools.

Newer versions of the modular malware have simultaneously removed audio recording features and added a keylogger module that shares overlaps with prior Powersing attacks. Other functions include checking for installed antivirus products and getting a list of processes indicating malware analysis.

The 2021 attacks are also notable for employing unlisted old YouTube links that are used to host an encoded string that's deciphered by Janicab to extract the command-and-control (C2) IP address for retrieving follow-on commands and exfiltrating data.

"Since the threat actor uses unlisted old YouTube links, the likelihood of finding the relevant links on YouTube is almost zero," the researchers said. "This also effectively allows the threat actor to reuse C2 infrastructure."

The findings underscore that the threat actor has continued to update its malware toolset to maintain stealthiness over extended periods of time.

Besides applications allowing a listing and operating system hardening, organizations are recommended to monitor Internet Explorer processes, since the browser is used in hidden mode to communicate with the C2 server.

As legal and financial sectors are a common targets for the threat actor, the researchers further theorized that DeathStalker's customers and operators could be weaponizing the intrusions to keep tabs on lawsuits, blackmail high-profile individuals, track financial assets, and harvest business intelligence about potential mergers and acquisitions.

Have a conversation


Keep community guidline!
SEND

No record found

Hi, would you like to be the first to comment!
Image
5th August, 2023 • Opinion

Scholar Indexing Society Thesis Topics


...

Read more

Image
22nd July, 2023 • Opinion

On the shoulders of giants

Read more

Image
21st June, 2023 • Special Issues

Pursuing a PhD in Informatics

Read more

ast

Error 500

Server Error

Exception Traces

This will only be displayed in DEVELOPMENT_MODE.
Error Message SQLSTATE[42000]: Syntax error or access violation: 1055 Expression #1 of SELECT list is not in GROUP BY clause and contains nonaggregated column 'scholari_sis_db.blog.id' which is not functionally dependent on columns in GROUP BY clause; this is incompatible with sql_mode=only_full_group_by
File /home2/scholari/public_html/app/models/PDODb.php On Line 1608
Stack Trace 1 /home2/scholari/public_html/app/models/PDODb.php(1608): PDOStatement->execute()
2 /home2/scholari/public_html/app/controllers/ApiController.php(57): PDODb->rawQuery('SELECT * FROM blog GROUP BY tag ORDER BY views DESC limit 5', NULL)
3 /home2/scholari/public_html/app/views/partials/ast/list.php(558): ApiController->arr('SELECT * FROM blog GROUP BY tag ORDER BY views DESC limit 5')
4 /home2/scholari/public_html/system/BaseView.php(401): include('/home2/scholari/public_html/app/views/partials/ast/list.php')
5 /home2/scholari/public_html/system/BaseController.php(669): BaseView->render('ast/list.php', stdClass, 'main_layout.php')
6 /home2/scholari/public_html/app/controllers/AstController.php(68): BaseController->render_view('ast/list.php', stdClass)
7 /home2/scholari/public_html/system/Router.php(196): AstController->index()
8 /home2/scholari/public_html/system/BaseView.php(465): Router->run('ast/list')
9 /home2/scholari/public_html/app/views/partials/blog/more_post.php(45): BaseView->render_page('ast/list', Array)
10 /home2/scholari/public_html/system/BaseView.php(401): include('/home2/scholari/public_html/app/views/partials/blog/more_post.php')
11 /home2/scholari/public_html/system/BaseController.php(669): BaseView->render('blog/more_post.php', stdClass, 'main_layout.php')
12 /home2/scholari/public_html/app/controllers/BlogController.php(400): BaseController->render_view('blog/more_post.php', stdClass)
13 /home2/scholari/public_html/system/Router.php(196): BlogController->more_post()
14 /home2/scholari/public_html/system/BaseView.php(465): Router->run('blog/more_post')
15 /home2/scholari/public_html/app/views/partials/blog/view.php(122): BaseView->render_page('blog/more_post?limit_count=20', Array)
16 /home2/scholari/public_html/system/BaseView.php(418): include('/home2/scholari/public_html/app/views/partials/blog/view.php')
17 /home2/scholari/public_html/app/views/layouts/main_layout.php(59): BaseView->render_body()
18 /home2/scholari/public_html/system/BaseView.php(385): include('/home2/scholari/public_html/app/views/layouts/main_layout.php')
19 /home2/scholari/public_html/system/BaseController.php(669): BaseView->render('blog/view.php', Array, 'main_layout.php')
20 /home2/scholari/public_html/app/controllers/BlogController.php(134): BaseController->render_view('blog/view.php', Array)
21 /home2/scholari/public_html/system/Router.php(196): BlogController->view('34')
22 /home2/scholari/public_html/system/Router.php(109): Router->run('blog/view/34')
23 /home2/scholari/public_html/index.php(106): Router->init()

Please contact system administrator

Close

Search SIS !

Articles, journal, project, hall of fame

Username or Email
Password

Don't have an account? Register

Do you have an account already? Login

Copyright © Scholar Indexing Society All Rights Reserved.