Security researchers at Cisco Talos have uncovered a disturbing trend in the cyber threat landscape – the targeting of IT industries by a group of hackers known as LilacSquid. These malicious actors have been actively conducting data theft campaigns since at least 2021, compromising targets in various sectors including pharmaceuticals, oil, gas, and technology companies across Asia, Europe, and the U.S.
The methods used by LilacSquid to infiltrate and compromise IT companies are sophisticated and multi-faceted. They exploit vulnerabilities in web applications and make use of stolen Remote Desktop Protocol (RDP) credentials to gain initial access to their targets. Once inside, they deploy a range of tools and techniques, including the MeshAgent remote access tool, a customized “PurpleInk” variant of the QuasarRAT malware, and open-source proxying tools like SSF.
The goal of these attacks is to establish long-term access to the compromised systems, allowing LilacSquid to exfiltrate sensitive data and potentially disrupt essential services. By utilizing multiple infection vectors and a modular approach to malware deployment, the hackers create redundant access points and conceal their activities, making it difficult for defenders to detect and mitigate the threat.
One of the key tools in LilacSquid’s arsenal is PurpleInk, a dynamic variant of the QuasarRAT malware that has been evolving since its first appearance in 2021. This sophisticated backdoor allows the attackers to carry out a range of malicious activities, including process termination, code execution, file theft, system data collection, and relayed connections through compromised hosts. Recent samples of PurpleInk suggest that the malware has been streamlined for stealthiness, possibly to evade detection by security tools.
To carry out their attacks, LilacSquid employs a multi-stage infection chain involving several malware components. InkBox acts as a loader for decrypting and executing PurpleInk backdoor payloads, while InkLoader runs PurpleInk in a separate process to evade detection. MeshAgent, an open-source remote management tool, serves as the initial foothold for deploying additional malware like SSF or PurpleInk to infected systems, giving the hackers broad capabilities for remote access and control.
The persistence and complexity of LilacSquid’s operations pose a significant threat to the cybersecurity of IT industries worldwide. By leveraging advanced techniques and tools, these hackers have demonstrated their ability to infiltrate and compromise high-value targets, potentially causing severe financial and reputational damage to their victims. Organizations must remain vigilant and take proactive steps to secure their infrastructure against evolving cyber threats like LilacSquid.
In conclusion, the emergence of groups like LilacSquid highlights the ongoing challenges faced by IT industries in defending against sophisticated and persistent cyber threats. As these malicious actors continue to innovate and adapt their tactics, it is crucial for organizations to invest in robust cybersecurity measures and stay informed about the latest threats and trends in the cybersecurity landscape. Failure to do so could result in devastating consequences for businesses and individuals alike.

