BTC $55865.7639
ETH $3222.4858
BNB $400.6682
SOL $110.6842
XRP $0.5548
ADA $0.6230
AVAX $39.2767
DOGE $0.0896
TRX $0.1404
wstETH $3751.1765
LINK $19.0474
DOT $8.0594
WETH $3236.9354
MATIC $1.0625
UNI $10.5983
WBTC $55965.3668
IMX $3.3901
ICP $13.0143
BCH $300.6764
LTC $74.8911
CAKE $3.2355
FIL $8.1517
ETC $28.1561
RNDR $7.4096
KAS $0.1718
DAI $0.9979
HBAR $0.1117
ATOM $11.3293
VET $0.0491
INJ $36.5642
TON $2.1072
OKB $51.3395
LDO $3.5443
FDUSD $1.0015
STX $3.0723
ARB $1.9162
NEAR $4.0168
XMR $131.7677
TIA $17.0755
XLM $0.1186
GRT $0.2823
ENS $22.2643
THETA $2.1117
MKR $2155.4331
WEMIX $2.1023
APEX $2.4575
BEAM $0.0357
BTC $55865.7639
ETH $3222.4858
BNB $400.6682
SOL $110.6842
XRP $0.5548
ADA $0.6230
AVAX $39.2767
DOGE $0.0896
TRX $0.1404
wstETH $3751.1765
LINK $19.0474
DOT $8.0594
WETH $3236.9354
MATIC $1.0625
UNI $10.5983
WBTC $55965.3668
IMX $3.3901
ICP $13.0143
BCH $300.6764
LTC $74.8911
CAKE $3.2355
FIL $8.1517
ETC $28.1561
RNDR $7.4096
KAS $0.1718
DAI $0.9979
HBAR $0.1117
ATOM $11.3293
VET $0.0491
INJ $36.5642
TON $2.1072
OKB $51.3395
LDO $3.5443
FDUSD $1.0015
STX $3.0723
ARB $1.9162
NEAR $4.0168
XMR $131.7677
TIA $17.0755
XLM $0.1186
GRT $0.2823
ENS $22.2643
THETA $2.1117
MKR $2155.4331
WEMIX $2.1023
APEX $2.4575
BEAM $0.0357
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Pakistani APT36 masquerades as training materials for cyberattacks on India

    The education sector is becoming a target of cyberattacks using Crimson RAT.

    According to SentinelOne, the Pakistan-based Transparent Tribe (APT36, Operation C-Major, PROJECTM and Mythic Leopard) is conducting cyber attacks on India's education sector to deploy malware called Crimson RAT.

    The .NET-based malware has the following capabilities:

    Exfiltration of files and system data to the attacker's server (C2);
    Taking screenshots;
    Terminate running processes;
    Loading and executing additional payloads to log keystrokes (keylogging) and steal browser credentials.

    As part of the campaign, Transparent Tribe distributes infected Microsoft Office documents that contain educational content and are referred to as "Assignment" or "Assignment #10". Documents use malicious macro code to launch Crimson RAT. In other cases, the group used OLE (Object Linking and Embedding) embedding technologies to launch malware.

    SentinelOne explains that malicious OLE documents require the user to double-click on a document element to unlock the content.

     

    The feature forces users to double-click on an image to view the content, thereby activating the OLE package that stores and executes the Crimson RAT, masquerading as an update process.

    It has also been observed that Crimson RAT variants delay their execution for a certain period of time - from 1 to 4 minutes, and also implement various obfuscation methods using the Crypto Obfuscator and Eazfuscator tools.

    This campaign is not the group's only operation targeting India. Previously, Transparent Tribe has been linked to an ongoing cyber-espionage campaign that targets Indian and Pakistani Android users through a backdoor called CapraRAT. According to preliminary estimates, about 150 people became victims. Malware could be downloaded from fake phishing websites, and the app itself is definitely a parody of WhatsApp in its interface and name.

    Author DeepWeb
    Proxyjacking has become a profitable business for cybercriminals
    ARES group lures former BreachForums users to their own sites

    Comments 0

    Add comment