BTC $59298.0674
ETH $2995.1082
BNB $564.5461
SOL $138.9487
XRP $0.5204
stETH $2988.3022
DOGE $0.1334
TON $5.0410
ADA $0.4575
AVAX $33.8253
TRX $0.1233
wstETH $3489.5418
DOT $7.0008
WETH $2991.4612
WBTC $59224.1780
BCH $430.2076
LINK $13.6208
MATIC $0.7136
UNI $7.1773
ICP $13.4980
LTC $80.7613
DAI $0.9998
FDUSD $1.0014
IMX $2.1335
CAKE $2.5463
RNDR $7.8041
ETC $25.7147
NEAR $6.1799
HBAR $0.0993
MNT $1.0047
PEPE $0.0000
FIL $5.7866
STX $2.0790
OKB $49.2189
ATOM $8.6634
WIF $2.7507
TAO $402.6061
VET $0.0352
MKR $2754.0755
KAS $0.1081
GRT $0.2513
USDE $0.9991
XMR $123.9184
FET $2.0138
XLM $0.1096
INJ $23.5604
AR $32.3518
BTC $59298.0674
ETH $2995.1082
BNB $564.5461
SOL $138.9487
XRP $0.5204
stETH $2988.3022
DOGE $0.1334
TON $5.0410
ADA $0.4575
AVAX $33.8253
TRX $0.1233
wstETH $3489.5418
DOT $7.0008
WETH $2991.4612
WBTC $59224.1780
BCH $430.2076
LINK $13.6208
MATIC $0.7136
UNI $7.1773
ICP $13.4980
LTC $80.7613
DAI $0.9998
FDUSD $1.0014
IMX $2.1335
CAKE $2.5463
RNDR $7.8041
ETC $25.7147
NEAR $6.1799
HBAR $0.0993
MNT $1.0047
PEPE $0.0000
FIL $5.7866
STX $2.0790
OKB $49.2189
ATOM $8.6634
WIF $2.7507
TAO $402.6061
VET $0.0352
MKR $2754.0755
KAS $0.1081
GRT $0.2513
USDE $0.9991
XMR $123.9184
FET $2.0138
XLM $0.1096
INJ $23.5604
AR $32.3518
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Cyber ​​spies rearmed: researchers talked about the tools of the Cranefly group


    The Geppei dropper and the Danfuan backdoor were in the hands of the attackers.

    Researchers from Symantec spoke about the new Cranefly group of cyberspies and their tools. After analyzing the activities of the attackers, the experts found the Danfuan backdoor and the Geppei dropper in their arsenal.

    Geppei is using a new technique to read commands from Internet Information Services (IIS) logs to install Danfuan and other hacking tools, the researchers say. In addition, the dropper reads commands containing malicious .ashx files that are saved in an arbitrary folder specified by the command parameter and run as backdoors.

    Symantec attributed this toolkit to UNC3524, aka Cranefly, which first became known in May 2022. Then the attackers massively collected the emails of victims involved in mergers, acquisitions and other financial transactions.

    The hallmark of this group is QUIETEXIT, a backdoor installed on network devices that do not support antiviruses or do not detect threats at endpoints, which allows attackers to stay online for a very long time without being noticed.

    According to Symantec, Cranefly was not seen stealing data from victims' devices, despite being on infected networks for up to 18 months. Summing up, experts called Cranefly an experienced gang of hackers who use special tools for attacks and actively cover their tracks.

    Author DeepWeb
    A series of powerful cyber attacks hit the governments of Slovakia and Poland
    Terabytes of Microsoft customer data stolen

    Comments 0

    Add comment