Press ESC to close

ToddyCat is making holes in your infrastructure

Category Details
Threat Actors ToddyCat (APT group)
Campaign Overview Attackers target governmental organizations, some defense-related, in the Asia-Pacific region to steal sensitive data.
Target Regions (Victims) Asia-Pacific region, primarily governmental and defense organizations.
Methodology Attackers maintain access using traffic tunneling techniques such as Reverse SSH Tunnel, SoftEther VPN, Ngrok, and FRP client.
Product Targeted Governmental and defense-related organizations’ systems.
Malware Reference LoFiSe, PcExter, PsExec, Impacket, SoftEther VPN, Ngrok, Krong, FRP client
Tools Used PsExec, Impacket, OpenSSH for Windows, SoftEther VPN, Ngrok, Krong, FRP, curl, SMB, Task Scheduler, Command Prompt
Vulnerabilities Exploited SMB/Windows Admin Shares (T1021.002), DLL Side-Loading (T1574.002), remote execution, tunneling techniques.
TTPs Use of tunneling tools for persistent access, exfiltration of data, use of legitimate cloud infrastructure (Ngrok), and DLL side-loading (Krong).
Attribution No direct attribution provided, but the APT group is called ToddyCat.
Recommendations Secure SMB shares, detect and block tunneling activities, monitor for unusual scheduled tasks and command-line activity.
Source Securelist by Kaspersky

Read full article: Read More

Disclaimer: The above summary has been generated by an AI language model.

Source: APT reports – Securelist

Published on: April 22, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *