HomeCyber BalkansAPT-C-60 Hackers infiltrate organization's network with weaponized Google Drive link

APT-C-60 Hackers infiltrate organization’s network with weaponized Google Drive link

Published on

spot_img

The recent cyber attack against organizations in Japan has been confirmed by the Japan Computer Emergency Response Team Coordination Center (JPCERT/CC). This attack is believed to have been perpetrated by the cyber espionage group APT-C-60. The attackers utilized phishing techniques, posing as a job applicant, to infiltrate the victim’s system and deploy advanced malware.

The attack commenced with a targeted phishing email sent to the recruitment contact point of the targeted organization. The email contained a Google Drive link that, upon access, led to the download of a malicious VHDX file (a virtual hard disk format). Upon mounting the VHDX file, several components were revealed, including decoy documents and an LNK file titled “Self-Introduction.lnk.” This LNK file used the legitimate executable file git.exe to execute a script (IPML.txt) that performed various actions such as opening a decoy document, creating a downloader file named SecureBootUEFi.dat, and establishing persistence through COM hijacking.

The downloader, SecureBootUEFi.dat, exhibited behaviors such as device identification and fetching secondary payloads from Bitbucket to download malicious files like Service.dat. These files were then decoded, saved, and deployed using COM hijacking techniques, ultimately leading to the deployment of a backdoor malware known as SpyGrace (version 3.1.6) for continued access to the compromised system.

This attack shows similarities with previous campaigns observed from August to September 2024, targeting organizations in Japan, South Korea, and China. There is a pattern of abuse of legitimate services like Bitbucket and StatCounter, as well as the use of COM hijacking for persistence. Decoy documents found in the recycle bin of the VHDX file indicate tailored phishing emails for these specific regions.

Security Operations Center (SOC) and Digital Forensics and Incident Response (DFIR) teams are advised to collect indicators of compromise detailed in the technical report to enhance their defenses against such cyber threats.

This attack highlights the evolving tactics of cybercriminals and the importance of cybersecurity measures to protect organizations from advanced threats. It serves as a reminder for businesses to stay vigilant and implement robust security protocols to safeguard their systems and sensitive information from malicious actors.

Source link

Latest articles

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...

Hamas-Linked Hackers Probe Middle Eastern Diplomats

 A cyber threat group affiliated with Hamas has been conducting espionage across the...

More like this

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...