• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
iGuRu

iGuRu

Real-time Technology News. Opinions & Tweaks

  • / news
  • / infosec
  • / tools
  • / tweaks
  • / dummies
  • / opinions
  • / support
home / News / Ke3chang attacks on diplomats in Europe

Ke3chang attacks on diplomats in Europe

18/07/2019 17:48 by newsbot

Οits researchers ESET have discovered new versions of families malware associated with the elusive Ke3chang team, as well as a backdoor that had never been detected so far. ESET has been monitoring the APT offensive team for several years, which is believed to be based in China.

The backdoor recently discovered, was first identified in late 2016 and against the 2017, and was named Okrum from ESET. It has been used to target diplomatic missions and government agencies in Belgium, Slovakia, Brazil, Chile and Guatemala. In addition, since 2015, ESET locates firmly new publications from knowns οικγconnections malware attributed to fthe team Ke3chang.

malware keyboard - Ke3chang attacks on diplomats in Europe

Since 2015, the ESET he had spotted new suspicious activities in European countries. It seemed that the team behind the attacks was particularly interested for Slovakia, however and Croatia, the Czech Republic and other countries as well had been attacked. Analyzing the malware used in these attacks, ESET researchers found connections with known malware families that were attributed to the team Ke3chang and they named these new versions of Ketrican.

"We began to realize what was happening when we discovered that the Okrum backdoor was used to infect with a Ketrican backdoor, which was created in 2017. In addition, we found that some diplomats who had been attacked by Okrum and backdoor Ketrican of the year 2015, were also targeted by backdoors Ketrican of the year 2017 ", says ESET researcher Zuzana Hromcova, responsible for the specific discoveries.

«The team remains active and in 2019 - in March, we spotted a new sample of Ketrican", Adds referring to the latest activities of the famous group.

From ESET survey arise items that connect the backdoor recently discovered by the Ke3chang team. In addition to the commonsyou objectives, Okrum has a similar way operatingίας με This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. already known malware team's Ke3chang. For example, Okrum has only The basic commands one backdoor and relies on manually typing shell commands and σperforming external tools for most of its malicious activity. This model is also its standard mode of operation teamς Ke3chang on campaigns που have been researched.

Although malware is not technically complex, it seems with certainty that the perpetrators behind Okrum they were trying to stay "Invisible". Her researchers ESET have identified many techniques avoid it Detection in Okrum Malware. The payload is hidden in a PNG file. When the file is viewed in an image viewer, a PNG image is displayed that looks harmless, however the loaders of Okrum can detect an additional encrypted file that the user cannot see.

Ke3chang 1024x549 - Ke3chang attacks diplomats in Europe
Schedule of Ke3chang team activity and ESET scouts

Also, the perpetrators behind This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. malware tried to hide This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. maliciousο traffic of C&C server inside σtheν normal traffic of registering seemingly legitimate domain names. «For example, the samples used against Slovak targets communicated with a domain name that mimickedν a Slovakό portal navigation », says η Hromcová.

Parallel, The cybercriminals were changing every few months ta sub-elements of loader and Okrum installer to decidethey bless her detection. At this stage, the systems of ESET have a detect seven different versions information loader and two installer versions, although the functionality remained the same.

More details and techniques information are located on white paper «Okrum and Ketrican: An overview of recent Ke3chang group activity» and This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. article «Okrum: Ke3chang group targets diplomatic missions» on WeLiveSecurity.com.

____________________

  • Huawei We are not developing Android
  • Buhtrap the team behind zero-day attacks
  • Q4OS 3.8 Centaurus for Windows users who do not want Windows
Ke3chang attacks on diplomats in Europe was last modified: 18 July, 2019, 5: 49 mm by newsbot

Subscribe to our newsletter

no spam

spread the news

  • Facebook
  • Twitter
  • Reddit
  • Printing
  • Email

Read them Technology News from all over the world, with the validity of iGuRu.gr

Follow us on Google News


Competition: NewsDay: 2015, 2016, 2017, domain, malware

You May Also Like

British Ministry of Education distributed notebooks with malware
ATMMalScan: Find malware on ATMs
Freki - Malware Analysis Platform

About Us newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Previous Post: « Firefox 70 will alert you if your password has leaked
Next Post: Firefox 68.0.1 (Quantum) download before official release »

Reader Interactions

Comment Policy:

IGuRu.gr does not publish the comments immediately. Malicious comments, comments that include ads, or comments that are offensive are deleted without notice. We do not adopt the opinions expressed by our readers.
Your comments will be displayed after approval by the administrators


Leave your comment
Ακύρωση απάντησης

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *

 

 © 2021 · iGuRu.gr · ☢ · Keep It Simple Stupid Genesis theme

about  ·   get in touch  ·  rss  ·  sitemap  ·  cough

loadingCancel
Could not post post - check your email address!
Email verification failed, please try again
Your blog can not post posts via email.