Press ESC to close

Analysis of Cyber Anarchy Squad attacks targeting Russian and Belarusian organizations

CategoryDetails
Threat ActorsC.A.S (Cyber Anarchy Squad)
Campaign OverviewAttacking organizations in Russia and Belarus since 2022 with goals of data theft, financial and reputational damage. Exploit publicly available services.
Target Regions (Victims)Russia, Belarus
MethodologyExploit public-facing applications, use open-source RATs, and deploy multiple attack stages including credential access, discovery, and command control.
Product TargetedJira, Confluence, Microsoft SQL Server
Malware ReferenceRevenge RAT, Spark RAT, Meterpreter, LockBit ransomware, Babuk
Tools UsedRevenge RAT, Spark RAT, Meterpreter, PowerShell, cURL, MS SQL, WMI, XenAllPasswordPro, BrowserThief, Mimikatz
Vulnerabilities ExploitedUnidentified vulnerabilities in publicly available services (Jira, Confluence, MS SQL)
TTPsInitial access via public-facing apps (T1190), use of PowerShell and cURL for execution, persistence through net.exe, RATs, credential access, evasion
AttributionLinked with other hacktivist groups like Ukrainian Cyber Alliance and DARKSTAR.
RecommendationsPerform regular testing, updating, integration of security systems, enforce password-protection policies, and configure EPP properly.
SourceSecurelist by Kaspersky

Read full article: https://securelist.com/cyber-anarchy-squad-attacks-with-uncommon-trojans/114990/

The above summary has been generated by an AI language model

Source: Securelist by Kaspersky

Published on: December 18, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *