Skip to content
  Tuesday 28 March 2023
  • Home
  • Cloud
  • Data
  • Cybersecurity
    • Attack
    • Malware
  • Technology
  • Home
  • Cloud
  • Data
  • Cybersecurity
    • Attack
    • Malware
  • Technology
Trending
April 22, 2022Digital banks aren’t doing enough to tackle financial crime, UK regulator warns July 6, 2022VW and Goldman-backed battery maker Northvolt gets $1.1 billion funding injection February 14, 2023Alphabet Chairman John Hennessy explains why Google was hesitant to put out its ChatGPT competitor September 22, 2022Researchers Disclose Critical Vulnerability in Oracle Cloud Infrastructure December 5, 2022Microsoft Warns of Growing Russian Digital Threats to Europe June 1, 2022Facebook parent Meta COO Sheryl Sandberg is stepping down August 22, 2022Google blocks ‘largest ever’ web DDoS attack January 6, 2023Texas County EMS Agency Says Ransomware Breach Hit 612,000 September 3, 2022Samsung Admits Data Breach that Exposed Details of Some U.S. Customers August 17, 2022‘Flash’ star Ezra Miller’s apology is not a get-out-of-jail-free card, experts say
  • Home
  • Cloud
  • Data
  • Cybersecurity
    • Attack
    • Malware
  • Technology
  • Home
  • Cloud
  • Data
  • Cybersecurity
    • Attack
    • Malware
  • Technology
  Attack  Researchers Uncover New Metador APT Targeting Telcos, ISPs, and Universities
Attack

Researchers Uncover New Metador APT Targeting Telcos, ISPs, and Universities

adminadmin—September 23, 20220
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail


A previously undocumented threat actor of unknown origin has been linked to attacks targeting telecom, internet service providers, and universities across multiple countries in the Middle East and Africa.

“The operators are highly aware of operations security, managing carefully segmented infrastructure per victim, and quickly deploying intricate countermeasures in the presence of security solutions,” researchers from SentinelOne said in a new report.

CyberSecurity

The cybersecurity firm codenamed the group Metador in reference to a string “I am meta” in one of their malware samples and because of Spanish-language responses from the command-and-control (C2) servers.

More stories

7 Reasons to Choose an MDR Provider

November 16, 2022

Is Once-Yearly Pen Testing Enough for Your Organization?

January 26, 2023

Hackers Use ModernLoader to Infect Systems with Stealers and Cryptominers

August 30, 2022

Hackers Can Abuse Visual Studio Marketplace to Target Developers with Malicious Extensions

January 9, 2023

The threat actor is said to have primarily focused on the development of cross-platform malware in its pursuit of espionage aims. Other hallmarks of the campaign are the limited number of intrusions and long-term access to targets.

This includes two different Windows malware platforms called metaMain and Mafalda that are expressly engineered to operate in-memory and elude detection. metaMain also acts as a conduit to deploy Mafalda, a flexible interactive implant supporting 67 commands.

metaMain, for its part, is feature-rich on its own, enabling the adversary to maintain long-term access, log keystrokes, download and upload arbitrary files, and execute shellcode.

In a sign that Mafalda is being actively maintained by its developers, the malware gained support for 13 new commands between two variants compiled in April and December 2021, adding options for credential theft, network reconnaissance, and file system manipulation.

CyberSecurity

Attack chains have further involved an unknown Linux malware that’s employed to gather information from the compromised environment and funnel it back to Mafalda. The entry vector used to facilitate the intrusions is unknown as yet.

What’s more, references in the internal command’s documentation for Mafalda suggest a clear separation of responsibilities between the developers and operators. Ultimately though, Metador’s attribution remains a “garbled mystery.”

“Moreover, the technical complexity of the malware and its active development suggest a well-resourced group able to acquire, maintain and extend multiple frameworks,” researchers Juan Andres Guerrero-Saade, Amitai Ben Shushan Ehrlich, and Aleksandar Milenkoski noted.





Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

admin

Firing Your Entire Cybersecurity Team? Are You Sure?
Google CEO Pichai tells employees not to ‘equate fun with money’ in heated all-hands meeting
Related posts
  • Related posts
  • More from author
Attack

Microsoft Introduces GPT-4 AI-Powered Security Copilot Tool to Empower Defenders

March 28, 20230
Attack

Pen Testing Solutions That Challenge the Status Quo

March 28, 20230
Attack

IcedID Malware Shifts Focus from Banking Fraud to Ransomware Delivery

March 28, 20230
Load more
Whoops, it looks like you forgot to specify a form to display.
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Attack

Microsoft Introduces GPT-4 AI-Powered Security Copilot Tool to Empower Defenders

March 28, 20230
Malware

End-to-End Cloud Security Built on Customer SuccessWebinar.

March 28, 20230
Malware

Partnering for Better Cloud Security: Enhanced Threat Detection and Response

March 28, 20230
Malware

North Korean Threat Groups Steal Crypto to Pay for Hacking

March 28, 20230
Attack

Pen Testing Solutions That Challenge the Status Quo

March 28, 20230
Attack

IcedID Malware Shifts Focus from Banking Fraud to Ransomware Delivery

March 28, 20230
Load more

Recent Posts

  • Microsoft Introduces GPT-4 AI-Powered Security Copilot Tool to Empower Defenders
  • End-to-End Cloud Security Built on Customer SuccessWebinar.
  • Partnering for Better Cloud Security: Enhanced Threat Detection and Response
  • North Korean Threat Groups Steal Crypto to Pay for Hacking
  • Pen Testing Solutions That Challenge the Status Quo

    © Copyright 2023, All Rights Reserved