DarkHydrus APT Uses Google Drive to Send Commands to RogueRobin Trojan
#1
Quote:New malicious campaigns attributed to DarkHydrus APT group show the adversary's use of a new variant of the RogueRobin Trojan and of Google Drive as an alternative command and control (C2) communication channel.

The group's latest activity was observed against targets in the Middle East, luring them with Excel documents laced with malicious VBA code (macro).

For security reasons, macros are disabled by default in the Microsoft Office suite, and they do not run unless the user enables the feature manually.

According to research from Palo Alto Networks' Unit 42, the text file hides a Windows Script Component (.SCT) file that delivers a version of the RogueRobin trojan. Originally, this custom payload is PowerShell-based, but it looks like the threat actor ported it to a compiled variant.

In a report this week, Unit 42 writes that "in addition to checks for common analysis tools running on the system. The Trojan also checks to see if a debugger is attached to its processes and will exit if it detects the presence of a debugger."

Source: https://www.bleepingcomputer.com/news/se...in-trojan/
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Google Chrome 137.0.7151.103/.104
Google Chrome 137....harlan4096 — 09:35
Thunderbird version 139.0.2 (stable rele...
Thunderbird versio...harlan4096 — 09:26
Emsisoft Anti-Malware 2025.5.0.12672
Changes in 2025.5....harlan4096 — 07:22
Android Security Bulletin—June 2025
Android Security B...harlan4096 — 07:13
Audacity 3.7.4
Audacity 3.7.4​ ...harlan4096 — 07:11

[-]
Birthdays
Today's Birthdays
avatar (37)Barrackleve
Upcoming Birthdays
avatar (38)Tedscolo
avatar (45)brakasig
avatar (44)JamesReshy
avatar (46)Francisemefe
avatar (39)leoniDup
avatar (38)Patrizaancem
avatar (38)biobdam
avatar (39)Julioagopy
avatar (49)aolaupitt2558
avatar (39)storoBox
avatar (47)kinotHeemn
avatar (38)Ceballos1976
avatar (39)efynu
avatar (31)horancos

[-]
Online Staff
There are no staff members currently online.

>