Shamoon-Slingers APT33 in Secret New Operations
#1
Information 
Quote:Security researchers are warning oil and aviation industry organizations to be on their guard after spotting a notorious Iranian APT group using private VPNs to keep its activity hidden.
 
APT33 has been linked to the infamous Shamoon destructive malware which knocked out tens of thousands of PCs at Saudi Aramco in 2012 and has been deployed across Europe and the Middle East since.
 
Now Trend Micro has observed the group using a dozen command and control (C&C) servers in a highly obfuscated attack targeting a narrow group of organizations in the US, Asia and Middle East.
 
“The C&C domains are usually hosted on cloud hosted proxies. These proxies relay URL requests from the infected bots to backends at shared webservers that may host thousands of legitimate domains,” said Trend Micro.
“The backends report bot data back to a data aggregator and bot control server that is on a dedicated IP address. The APT33 actors connect to these aggregators via a private VPN network with exit nodes that are changed frequently. The APT33 actors then issue commands to the bots and collect data from the bots using these VPN connections.”

Read more: https://www.infosecurity-magazine.com/ne...ecret-new/
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
PatchMyPC 5.2.0.0 (25-April/2025)
What’s new in 5.2....harlan4096 — 10:33
AMD releases Ryzen 5 7533HS processor wi...
AMD launches new Z...harlan4096 — 10:32
Adobe Acrobat Reader DC 2025.001.20467
Adobe Acrobat Read...harlan4096 — 06:11
GFYI [Official] CheckMAL's AppCheck Pro...
tweet CheckMAL Secu...dhruv2193 — 17:10
Introducing Advanced Chat Privacy: Enhan...
Introducing Advanc...harlan4096 — 11:49

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (50)Toligo

[-]
Online Staff
There are no staff members currently online.

>