logo
  • Home
  • TRAVEL
  • HOTELS
  • RESTAURANTS
  • FOOD RETAIL
  • TECH NEWS
  • EXECUTIVE TALKS
  • EVENTS
  • Home
  • TRAVEL
  • HOTELS
  • RESTAURANTS
  • FOOD RETAIL
  • TECH NEWS
  • EXECUTIVE TALKS
  • EVENTS

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

Facebook Twitter Instagram YouTube LinkedIn
Monday, January 30
Facebook Twitter Instagram YouTube LinkedIn
Eat ‘N StaysEat ‘N Stays
  • Home
  • TRAVEL
  • HOTELS
  • RESTAURANTS
  • FOOD RETAIL
  • TECH NEWS
  • EXECUTIVE TALKS
  • EVENTS
Home»Tech News»Cybercriminal group targets legal, financial and travel entities with new malware, Kaspersky intelligence found
Tech News

Cybercriminal group targets legal, financial and travel entities with new malware, Kaspersky intelligence found

eatBy eatJanuary 10, 2023No Comments3 Mins Read16 Views
Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
Sample unlisted YouTube DDR used in recent intrusions
Share
Facebook Twitter LinkedIn Pinterest Email

Kaspersky experts have identified new functionalities within the Janicab malware, which is being used by a mercenary APT group DeathStalker to infiltrate specific organisations within a number of industries.

The new variant has been spotted across European and Middle Eastern territories and is leveraging legitimate external web services such as YouTube as part of the infection chain.

Unlike more traditional damage resulting from cyberattacks such as digital blackmail or ransomware, the Janicab infections can lead to targeted logistical and legal challenges, rivals advantage, sudden audits with prejudice and misuse of intellectual property to name a few.

Janicab can be considered a modular, interpreted-language malware, which means that the threat actor is able to add/remove functions or embedded files with very little effort. Based on Kaspersky telemetry – even though the delivery mechanism remains spear-phishing – newer Janicab variants have changed significantly in structure, with the presence of archives containing several Python files and other artifacts used later in the intrusion lifecycle. Once a victim is tricked into opening the malicious file, a series of chained malware files are subsequently dropped.

One of the distinctive features of DeathStalker is its use of DDRs/web services to host an encoded string that is later deciphered by the malware implant. According to a new report, Kaspersky identified the use of old YouTube links that were present in 2021 intrusions. With unlisted web links being unintuitive and harder to find, the threat actor is able to operate undetected and reuse C2 infrastructure.

The affected entities that fall within the traditional sphere of DeathStalker are primarily legal and financial investment management (FSI) institutions. However, Kaspersky has also recorded threat activity affecting travel agencies. The European region, together with the Middle East, were also seen as a typical workspace for DeathStalker with varying intensity between the countries.

“As legal and financial institutions are a common target for this threat actor, we can safely assume that DeathStalker’s main goals rely on the looting of confidential information regarding legal disputes involving VIPs and large financial assets, competitive business intelligence and insights into mergers and acquisitions”, commented Dr. Amin Hasbini, Head of Research Center, META, Global Research and Analysis Team, Kaspersky. “Organisations operating in these industries should proactively prepare for such intrusions and/or updating their threat model to ensure data remains safe,” he added.

Since the threat actor continues to use interpreted-language-based malware such as Python, VBE and VBS across both historical and recent intrusions, affected institutions should rely on application whitelisting and OS hardening as effective techniques to block any intrusion attempts. Defenders should also look for Internet Explorer processes running without GUI since Janicab is using Internet Explorer in hidden mode to communicate with the C2 infrastructure.

More information about the event logs technique can be found at Securelist.com.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
eat
  • Website

Related Posts

Software AG demonstrates competitiveness of a truly connected enterprise at LEAP 2023

January 30, 2023

Huawei partners with stc tv to bring next-gen digital entertainment to Huawei users across the MENA region

January 30, 2023

SOCs to face greater challenges from cybercriminals targeting governments and media, despite staff shortages in 2023

January 29, 2023

Top 5 data privacy trends that will rule 2023

January 29, 2023

Smart roads: the arteries of progress

January 29, 2023

Turn Your Home Into The Best Destination For Staycation With LG TVs

January 28, 2023

Leave A Reply Cancel Reply

Advertisement
 Advertise
Eat ‘N Stays
Facebook Twitter Instagram Pinterest YouTube Dribbble
  • Home
  • About Us
  • Contact Us
  • Archive
© Copyright © 2023, Eat ‘N Stays. All rights reserved.

Type above and press Enter to search. Press Esc to cancel.

Stay ahead and get up to date coverage of your industry news and trends.
Eat ‘N Stays is owned by: GLOBAL HOSPITALITY & TRAVEL – FZCO

Contact Details

Facebook Twitter YouTube LinkedIn Instagram
  • +966509749018
  • +966509749018
  • Email us
  • Contact us for Advertisement

Our Picks

Mandarin Oriental Announces A New Luxury Resort In Mallorca, Spain

January 30, 2023

Nazcaa Launches Chic New Business Lunch

January 30, 2023

Golf Stars Chasing Leader Rory Mcilroy After His Stunning Birdie Blitz At Hero Dubai Desert Classic

January 30, 2023
© Copyright © 2023, Eat ‘N Stays. All rights reserved.
  • Privacy Policy
  • Archive
  • About us
  • Contact us