Press ESC to close

Cloudy With a Chance of RATs: Unveiling APT36 and the Evolution of ElizaRAT

CategoryDetails
Threat ActorsAPT36 (Transparent Tribe)
Campaign OverviewTargeting Indian government organizations, diplomatic personnel, and military facilities. Focus on ElizaRAT’s evolution and associated payloads.
Target Regions (Victims)India
MethodologyPhishing for initial infection via CPL files distributed through cloud services (e.g., Google Drive, Telegram, Slack).
Product TargetedWindows, Linux, Android systems
Malware ReferenceElizaRAT (Windows RAT), ApoloStealer (stealer payload), SlackAPI.dll (variant), Circle ElizaRAT
Tools UsedGoogle Drive, Telegram, Slack for C2, IWSHshell, SQLite, Costura
Vulnerabilities ExploitedNo specific vulnerabilities identified; relies on phishing and social engineering (CPL file execution).
TTPsUse of cloud services for C2, decoy files, file exfiltration, keylogging, remote file execution, data stealing.
AttributionPakistan-based, APT36 (Transparent Tribe)
RecommendationsIncreased awareness on phishing attacks, monitoring for cloud service abuse, strong endpoint protections.
SourceCheck Point

Read full article: https://research.checkpoint.com/2024/the-evolution-of-transparent-tribes-new-malware/

The above summary has been generated by an AI language model

Leave a Reply

Your email address will not be published. Required fields are marked *