BTC $63426.4044
ETH $3238.7537
BNB $594.0595
SOL $142.1468
stETH $3233.7503
XRP $0.5201
DOGE $0.1481
TON $5.3433
ADA $0.4657
AVAX $34.4545
wstETH $3771.3316
TRX $0.1201
WETH $3237.3718
WBTC $63451.3701
DOT $6.7967
BCH $475.3407
LINK $14.1619
MATIC $0.7280
UNI $7.8941
LTC $84.0100
ICP $13.1742
DAI $1.0004
NEAR $7.5700
CAKE $2.7331
RNDR $8.0888
IMX $2.1110
ETC $27.5159
FDUSD $1.0009
HBAR $0.1081
STX $2.5324
MNT $1.0878
FIL $5.9184
OKB $52.7529
PEPE $0.0000
VET $0.0394
TAO $422.3698
ATOM $8.4022
WIF $2.7640
MKR $2983.3504
KAS $0.1104
GRT $0.2674
FET $2.1735
THETA $2.3707
USDE $0.9991
INJ $25.9460
XLM $0.1143
AR $34.3665
BTC $63426.4044
ETH $3238.7537
BNB $594.0595
SOL $142.1468
stETH $3233.7503
XRP $0.5201
DOGE $0.1481
TON $5.3433
ADA $0.4657
AVAX $34.4545
wstETH $3771.3316
TRX $0.1201
WETH $3237.3718
WBTC $63451.3701
DOT $6.7967
BCH $475.3407
LINK $14.1619
MATIC $0.7280
UNI $7.8941
LTC $84.0100
ICP $13.1742
DAI $1.0004
NEAR $7.5700
CAKE $2.7331
RNDR $8.0888
IMX $2.1110
ETC $27.5159
FDUSD $1.0009
HBAR $0.1081
STX $2.5324
MNT $1.0878
FIL $5.9184
OKB $52.7529
PEPE $0.0000
VET $0.0394
TAO $422.3698
ATOM $8.4022
WIF $2.7640
MKR $2983.3504
KAS $0.1104
GRT $0.2674
FET $2.1735
THETA $2.3707
USDE $0.9991
INJ $25.9460
XLM $0.1143
AR $34.3665
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • A new player has appeared in cyberspace - the Clasiopa group

    Cybersecurity researchers at cybersecurity firm Symantec report that materials research organizations in Asia have been targeted by a previously unknown group tracked by experts as Clasiopa.

    The origin of the hacker group and its affiliation is currently unknown, but there are hints that the cybercriminals may have ties to India. This conclusion was made based on links to "SAPTARISHI-ATHARVAN-101" (Saptarishi - a seer from Hindu literature, Atharvan - a priest, co-author of part of Hindu religious scriptures) in the backdoor and the use of the password "iloveindea1998^_^" for the malicious ZIP archive.

    "While these details may indicate that the group is based in India, it is also likely that the information was planted as a false flag, and the password, in particular, seems too obvious a clue," Symantec said in the report.

    The exact means of initial access is also unclear, although there are suspicions that hackers are conducting brute-force attacks on servers connected to the Internet. Some of the key signs of intrusions include clearing the system monitor and event logs, and deploying several backdoors such as Atharvan and a modified open source version of Lilith RAT to steal sensitive information.

    In addition, Atharvan can contact a hard-coded command and control server address (C2, C&C) to extract and run arbitrary executable files on the infected host. The C&C server addresses refer to Amazon AWS in South Korea, which is not a common place for C2 infrastructure.

    Judging by the tools and tactics used, the group's main motive is to gain constant access to devices without detection, as well as to steal information.

    Author DeepWeb
    Medusa group asks US school district for $1 million ransom
    PureCrypter malware attacks government organizations with ransomware and information thieves

    Comments 0

    Add comment