HomeCyber BalkansAPT36 Hackers Targeting Windows Devices Using ElizaRAT

APT36 Hackers Targeting Windows Devices Using ElizaRAT

Published on

spot_img

In recent news, a sophisticated threat actor known as APT36 has been actively targeting Indian entities using advanced malware like ElizaRAT, specifically designed for espionage purposes. These cybercriminals have been leveraging cloud-based services for covert communication and data exfiltration, making their attacks harder to detect and trace.

One of the key developments in APT36’s recent campaigns is the enhancement of ElizaRAT’s evasion techniques, making it even more potent for carrying out persistent attacks. Additionally, the integration of ApoloStealer into their attack toolkit has further expanded the group’s capabilities, allowing them to steal sensitive information from compromised systems with ease.

Transparent Tribe, the suspected actor behind these attacks, has been employing a two-pronged strategy with ElizaRAT and ApoloStealer to target Indian systems. By disguising themselves as CPL files, they have been able to infiltrate systems, leverage Slack’s API for communication, steal information, and execute commands without raising suspicion.

ApoloStealer, a tool deployed by Transparent Tribe, focuses on data exfiltration by creating a local database of files, including documents, presentations, and images, which are then transmitted to the attacker’s server. This sophisticated technique allows the cybercriminals to gather specific information while remaining undetected.

The Circle ElizaRAT variant, a more advanced version of the malware, uses a dropper to deploy the malicious code with lower detection rates. This dropper creates decoy files and registers victim information within DLLs in a dedicated directory. Circle also utilizes a VPS for C2 communication, checks for India Standard Time, retrieves victim details, and can execute commands given by the attacker.

The Google Drive campaign, another tactic employed by APT36, delivers ElizaRAT malware via spear phishing emails with malicious CPL file attachments. This method leverages Google Cloud for communication, uses X.509 certificates for authentication, and downloads additional payloads like ApoloStealer and ConnectX to steal specific file types and store them on Google Cloud storage service.

Overall, Check Point Research has identified Transparent Tribe’s involvement in these attacks through their custom tool, ElizaRAT, and other indicators like shared email accounts and the use of the pseudonym “Apolo Jones.” These cybercriminals have been utilizing sophisticated tactics, such as distributing malicious files and leveraging social engineering techniques, to target specific individuals and gather intelligence.

The evolving tactics of APT36, including the introduction of new payloads like ApolloStealer, demonstrate their relentless focus on data exfiltration and intelligence gathering against Indian entities. This highlights the importance of robust cybersecurity measures and the need for organizations to stay vigilant against such sophisticated cyber threats.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...