HomeCII/OTPoco RAT Infiltrates Mining Sector

Poco RAT Infiltrates Mining Sector

Published on

spot_img

An unknown group of attackers has been identified as the source of a new remote access trojan (RAT) that specializes in stealing credentials and spying on networks, with the potential to deliver additional malware. This malicious software, named Poco RAT due to its use of the POCO C++ libraries as a means of evasion, has primarily targeted companies in the mining and manufacturing sectors in Latin America.

Initially discovered in an email campaign that heavily impacted an undisclosed entity in the Latin American mining industry, the Poco RAT has since expanded its reach to other sectors such as manufacturing, hospitality, and utilities. The email campaign used by the attackers follows a distinct pattern, with messages in Spanish focusing on financial themes like invoices to entice recipients. These emails contain malicious Google Drive and HTML files that serve as carriers for the Poco RAT.

According to Cofense researchers, who have published a detailed report on the malware, the use of legitimate file hosting services like Google Drive has become a common tactic among threat actors to bypass secure email gateways. The distribution methods employed by the attackers varied, including direct links to 7zip archives, embedded links in HTML files, and attachments with PDF files, all leading to the download of the Poco RAT.

The functionality and evasion tactics of the Poco RAT are designed to avoid detection and facilitate communication with a command-and-control server (C2) for carrying out various malicious activities. Upon execution, the malware establishes persistence through a registry key and launches the grpconv.exe process, which has limited legitimate use on modern Windows operating systems. The Delphi-coded executable contains an abundance of Exif metadata, each instance tailored with random corporate details to obfuscate its origins.

In terms of communication, the Poco RAT links to a static C2 through specific port numbers, responding only to infected devices located in Latin America. Once connected, the RAT transmits system data and proceeds to download and execute files for further malware delivery. To enhance its stealth capabilities, the malware leverages the widely used POCO C++ libraries, reducing the likelihood of detection compared to custom-coded alternatives.

For organizations looking to detect and counteract the Poco RAT, focusing on blocking Google Drive links and monitoring network traffic to the identified C2 address is recommended. By proactively tracking the C2’s IP address and setting up alerts for suspicious activities like the execution of grpconv.exe, potential instances of the RAT can be intercepted before causing harm. This proactive approach is crucial in safeguarding systems against evolving threats like the Poco RAT.

Source link

Latest articles

New Aeternum C2 Botnet Avoids Takedowns Using Polygon Blockchain

The Evolution of Botnets: Aeternum C2 and Its Blockchain-Based Control Mechanism For years, the method...

Windows 11 Update Enhances BitLocker and Sysmon

Schubert Jonckheer and Kolbe LLP Launches Investigation into QualDerm Partners Data Breach In response to...

Hackers Utilize 1Campaign to Conceal Malicious Ads from Google Reviewers

New Cloaking Platform 1Campaign: A Threatening Tool for Cybercriminals In a recent analysis, cybersecurity researchers...

Google Thwarts Hackers Linked to China – CyberMaterial

Google has recently taken significant measures to dismantle a large-scale surveillance operation associated with...

More like this

New Aeternum C2 Botnet Avoids Takedowns Using Polygon Blockchain

The Evolution of Botnets: Aeternum C2 and Its Blockchain-Based Control Mechanism For years, the method...

Windows 11 Update Enhances BitLocker and Sysmon

Schubert Jonckheer and Kolbe LLP Launches Investigation into QualDerm Partners Data Breach In response to...

Hackers Utilize 1Campaign to Conceal Malicious Ads from Google Reviewers

New Cloaking Platform 1Campaign: A Threatening Tool for Cybercriminals In a recent analysis, cybersecurity researchers...