Press ESC to close

CloudSorcerer – A new APT targeting Russian government entities

CategoryDetails
Threat ActorsCloudSorcerer
Campaign OverviewAdvanced persistent threat (APT) targeting Russian government entities, primarily for cyber espionage.
Target Regions (Or Victims)Russian government entities
MethodologyUses public cloud services (Microsoft Graph, Yandex Cloud, Dropbox) as C2 infrastructure. Executes via GitHub.
Product TargetedRussian government systems
Malware ReferenceCloudSorcerer
Tools UsedMicrosoft Graph, Yandex Cloud, Dropbox, GitHub, Windows API functions, COM objects, GitHub C2 server.
Vulnerabilities ExploitedNo specific vulnerabilities mentioned, relies on cloud resources for C2.
TTPsUses cloud resources for C2, inter-process communication, backdoor functionality, and process injection.
AttributionLikely Russian-linked, based on targets.
RecommendationsSecure cloud services, monitor for unusual C2 traffic, prevent unauthorized GitHub repository access.
SourceSecurelist by Kaspersky

Read full article: https://securelist.com/cloudsorcerer-new-apt-cloud-actor/113056/

The above summary has been generated by an AI language model

Leave a Reply

Your email address will not be published. Required fields are marked *