BTC $104330.3707
ETH $2510.1520
XRP $2.1630
BNB $654.1283
SOL $154.5333
DOGE $0.1903
ADA $0.6737
TRX $0.2684
stETH $2506.6324
WBTC $104198.0763
SUI $3.2539
HYPE $32.4676
wstETH $3019.9422
LINK $13.8756
AVAX $20.6916
USDS $0.9971
XLM $0.2660
BCH $403.3624
LEO $8.6647
TON $3.1362
HBAR $0.1681
WETH $2509.6504
LTC $86.6251
weETH $2681.9653
DOT $4.0474
XMR $326.6821
BSC-USD $1.0009
BGB $4.6659
BTCB $104391.3173
WBT $31.1115
USDE $1.0009
PEPE $0.0000
PI $0.6362
TAO $427.1778
AAVE $241.5329
UNI $6.1813
DAI $1.0000
sUSDe $1.1713
CRO $0.1028
OKB $50.0234
APT $4.7432
NEAR $2.4095
CBBTC $104330.1318
ICP $4.9012
ONDO $0.8276
ETC $16.8752
GT $19.2728
BTC $104330.3707
ETH $2510.1520
XRP $2.1630
BNB $654.1283
SOL $154.5333
DOGE $0.1903
ADA $0.6737
TRX $0.2684
stETH $2506.6324
WBTC $104198.0763
SUI $3.2539
HYPE $32.4676
wstETH $3019.9422
LINK $13.8756
AVAX $20.6916
USDS $0.9971
XLM $0.2660
BCH $403.3624
LEO $8.6647
TON $3.1362
HBAR $0.1681
WETH $2509.6504
LTC $86.6251
weETH $2681.9653
DOT $4.0474
XMR $326.6821
BSC-USD $1.0009
BGB $4.6659
BTCB $104391.3173
WBT $31.1115
USDE $1.0009
PEPE $0.0000
PI $0.6362
TAO $427.1778
AAVE $241.5329
UNI $6.1813
DAI $1.0000
sUSDe $1.1713
CRO $0.1028
OKB $50.0234
APT $4.7432
NEAR $2.4095
CBBTC $104330.1318
ICP $4.9012
ONDO $0.8276
ETC $16.8752
GT $19.2728
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • For 14 years, Mahagrass spied on South Asian networks

    Hackers now have a new way to spread the Remcos Trojan.

    The Chinese defense company Qi'anxin found that the APT-Q-36 group (Mahagrass, Patchwork, Dropping Elephant, and Hangover) was up to new tricks. The group, which has roots in South Asia, has been spying online since 2009. Their major targets have been Asian government and military institutions, as well as groups working in energy, industry, science, education, politics, and economics.

    The group recently spread the Remcos Remote Access Trojan (RAT) using the Spyder Loader. Attackers often use this Trojan to spy on computers and steal private data. The attacker's goal is clear.

    Spyder can download and run executable files from a Command and Control (C2) server. It has been changed several times in the past few months. It was noticed that encrypted strings were used to hide static from security programs and that the data format was changed so that it could be sent to C2 servers.

    Pakistan, Bangladesh, and Afghanistan were named as possible places to attack. This shows that attackers are very focused and deliberate in their efforts to stay hidden and finish their missions to gather information.

    Qi'anxin tells users to be careful and stay away from sketchy links on social networks and email attachments from people you don't know. They should also not run strange files or install software from sources you don't trust. Cybersecurity is still a big issue because these kinds of groups are always coming up with new ways to attack and get around defenses.

    As we may remember, HP Wolf Security's most recent cybersecurity report for the third quarter of 2023 shows that the number of campaigns using RAT Trojans has grown significantly. RATs are being used more and more, and they are often hidden in Excel and PowerPoint files that look like they are safe and are attached to emails.

    Also, in September, a large-scale phishing campaign was found in Colombia that was aimed at more than 40 big companies in a range of industries. The attackers' plan was to sneakily put Remcos RAT on the computers of company workers so they could get more information and hack the computers even more.

    Also, Symantec revealed a string of attacks in 2022 that were linked to the APT41 (Winnti) group. These attacks targeted Hong Kong government agencies and, in some cases, went unnoticed for a year. It was their "calling card" to use the Spyder Loader in these attacks, and they had done so in other strikes before.

    Author reign3d
    Credentials are the most delectable treat for cybercriminals
    Understanding Backdoors: Their Role and Impact in Digital Security

    Comments 0

    Add comment