Press ESC to close

Hidden in Plain Sight: TA397’s New Attack Chain Delivers Espionage RATs

CategoryDetails
Threat ActorsTA397 (also known as Bitter)
Campaign OverviewTargeted Turkish defense sector with spearphishing email containing RAR archive with malicious payloads; aimed at intelligence gathering.
Target RegionsTurkey (EMEA), government, defense, energy, telecommunications, and engineering sectors.
MethodologySpearphishing email with RAR archive, LNK file, and NTFS alternate data streams (ADS) to deliver malware; uses scheduled tasks for persistence.
Product TargetedGovernment and defense sector organizations
Malware ReferenceWmRAT, MiyaRAT
Tools UsedRAR archive, LNK file, NTFS alternate data streams (ADS), PowerShell, curl, MSI installer
Vulnerabilities ExploitedNo specific software vulnerabilities; relies on social engineering and malicious payload delivery
TTPsSpearphishing, RAR archive payload delivery, NTFS ADS, scheduled task creation, PowerShell for payload execution, exfiltration via command line
AttributionAPT TA397 (Bitter), likely associated with a South Asian government
RecommendationsMonitor for scheduled tasks, inspect RAR file usage, block suspicious domains, use security tools to detect NTFS ADS and PowerShell-based attacks
SourceProofpoint

Read full article: https://www.proofpoint.com/us/blog/threat-insight/hidden-plain-sight-ta397s-new-attack-chain-delivers-espionage-rats

The above summary has been generated by an AI language model

Source: Proofpoint

Published on: December 17, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *