Threat Actor Uses DNS Redirects, DNSpionage RAT to Attack Government Targets
#1
Quote:Cisco Talos discovered a new malware campaign targeting a commercial Lebanese airline company, as well as United Arab Emirates (UAE) and Lebanon government domains.

According to Cisco Talos' findings
, the recently observed campaign could not be connected to other threat actors or attacks based on the used infrastructure and its Tactics, Techniques, and Procedures (TTP).

The actor was observed while using maliciously crafted Word and Excel documents powered by macros which would compromise targets visiting two fake job postings websites controlled by the attacker.

The documents used to infect targets drop a new remote administration tool which Cisco Talos named DNSpionage because of its capability of communicating with its masters using a DNS tunneling communication channel.

Moreover, after being dropped on the compromised machine, DNSpionage will use the Downloads folder as storage for tools and scripts it downloads from the command-and-control (C&C) server, while the Uploads directory is the temporary location for all exfiltrated data.

Source: https://news.softpedia.com/news/threat-a...4015.shtml
[-] The following 2 users say Thank You to silversurfer for this post:
  • harlan4096, wwd
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
AdGuard Browser Extension 5.1.101 (MV3 s...
AdGuard Browser Ex...harlan4096 — 07:39
Europe just launched DNS4EU, a public DN...
DNS is one of the ...harlan4096 — 07:36
LibreOffice 25.2.4
LibreOffice 25.2.4...harlan4096 — 07:25
K-Lite Codec Pack 19.0.0 / 18.9.7 Update
Changes in 19.0.0:...harlan4096 — 07:24
Microsoft Edge 137.0.3296.68
Version 137.0.3296...harlan4096 — 07:23

[-]
Birthdays
Today's Birthdays
avatar (47)vadimTob
avatar (37)leannauu4
Upcoming Birthdays
avatar (38)Tedscolo
avatar (45)brakasig
avatar (44)JamesReshy
avatar (46)Francisemefe
avatar (39)leoniDup
avatar (38)Patrizaancem
avatar (38)biobdam
avatar (41)zacforat
avatar (46)NemrokReks
avatar (37)Barrackleve
avatar (39)Julioagopy
avatar (49)aolaupitt2558
avatar (39)storoBox
avatar (47)kinotHeemn
avatar (38)Ceballos1976
avatar (39)efynu
avatar (31)horancos

[-]
Online Staff
There are no staff members currently online.

>