The cyber security expert, Marco Ramilli, analyzed it to match the clues e find if Iranian state-sponsored hackers are behind the operation. Something says Yes, something diverge.
Cybaze-Yoroi ZLAB cyber security experts: The campaign shows the Matryoshka structure to chain SFX archives, typical of APT implant, and the use of a legit third party RAT as payload.
Palo Alto cyber security experts: The APT exploited a recently patched remote code execution vulnerability to upload a variety of tools. From Mimikatz to HyperBro.
The cyber security experts: The APT’s malicious code implements a custom protocol that allows traffic to be funneled between a source and a destination IP address.
Published on 3 Telegram channels many leaks on Tehran’s APTs. Clearky cyber security experts: They are authentic and will minimize the potential attacks risks in the next few months.
Yoroi-Cybaze cyber security experts: The APT malware is spearhead of a sophisticated cyber arsenal. It could be the tip of the iceberg of a more complex and articulated attack.
The cyber security experts: There are many similarities on TTPs, targets and purposes. The credential harvesting could be complementary to the WebMask project on DNS Hijack.
Yoroi-Cybaze cyber security experts, after an in dept analysis, confirm. The malicious document, that contains Emotet malware, is linked to Russian Hackers.
Cisco Talos cyber security experts: At least 40 organizations across 13 different countries were compromised by a state-sponsored actor who exploits DNS hijacking.
Yoroi-Cybaze cyber security experts: It contains Emotet malware and should linked to Russian hackers. But some elements are confusing and need to be deepened.