• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • About Us
  • Contact Us

iHash

News and How to's

  • Smart Home DIY Wireless Alarm Security System 4-Piece Kit for $69

    Smart Home DIY Wireless Alarm Security System 4-Piece Kit for $69
  • Flux 7 TWS Earbuds with Wireless Charging Case & Power Bank for $24

    Flux 7 TWS Earbuds with Wireless Charging Case & Power Bank for $24
  • MiniTool MovieMaker Ultimate Plan: Perpetual Lifetime License for $49

    MiniTool MovieMaker Ultimate Plan: Perpetual Lifetime License for $49
  • Robolly Graphic Automation: Lifetime Subscription for $29

    Robolly Graphic Automation: Lifetime Subscription for $29
  • Animation Desk Windows Pro Lite: Lifetime Subscription for $59

    Animation Desk Windows Pro Lite: Lifetime Subscription for $59
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

New ToddyCat Hacker Group on Experts’ Radar After Targeting MS Exchange Servers

Jun 21, 2022 by iHash Leave a Comment

An advanced persistent threat (APT) actor codenamed ToddyCat has been linked to a string of attacks aimed at high-profile entities in Europe and Asia since at least December 2020.

The relatively new adversarial collective is said to have commenced its operations by targeting Microsoft Exchange servers in Taiwan and Vietnam using an unknown exploit to deploy the China Chopper web shell and activate a multi-stage infection chain.

Other prominent countries targeted include Afghanistan, India, Indonesia, Iran, Kyrgyzstan, Malaysia, Pakistan, Russia, Slovakia, Thailand, the U.K., and Uzbekistan, just as the threat actor evolved its toolset over the course of different campaigns.

“The first wave of attacks exclusively targeted Microsoft Exchange Servers, which were compromised with Samurai, a sophisticated passive backdoor that usually works on ports 80 and 443,” Russian cybersecurity company Kaspersky said in a report published today.

CyberSecurity

“The malware allows arbitrary C# code execution and is used with multiple modules that allow the attacker to administrate the remote system and move laterally inside the targeted network.”

ToddyCat, also tracked under the moniker Websiic by Slovak cybersecurity firm ESET, first came to light in March 2021 for its exploitation of ProxyLogon Exchange flaws to target email servers belonging to private companies in Asia and a governmental body in Europe.

The attack sequence post the deployment of the China Chopper web shell leads to the execution of a dropper that, in turn, is used to make Windows Registry modifications to launch a second-stage loader, which, for its part, is designed to trigger a third-stage .NET loader that’s responsible for running Samurai.

The backdoor, besides using techniques like obfuscation and control flow flattening to make it resistant to reverse engineering, is modular in that it the components make it possible to execute arbitrary commands and exfiltrate files of interest from the compromised host.

Also observed in specific incidents is a sophisticated tool named Ninja that’s spawned by the Samurai implant and likely functions as a collaborative tool allowing multiple operators to work on the same machine simultaneously.

CyberSecurity

Its feature similarities to other post-exploitation toolkits like Cobalt Strike notwithstanding, the malware enables the attacker to “control remote systems, avoid detection, and penetrate deep inside a targeted network.”

Despite the fact that ToddyCat victims are related to countries and sectors traditionally targeted by Chinese-speaking groups, there is no evidence tying the modus operandi to a known threat actor.

“ToddyCat is a sophisticated APT group that uses multiple techniques to avoid detection and thereby keeps a low profile,” Kaspersky security researcher Giampaolo Dedola said.

“The affected organizations, both governmental and military, show that this group is focused on very high-profile targets and is probably used to achieve critical goals, likely related to geopolitical interests.”

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: computer security, cyber attacks, cyber news, cyber security news, cyber security news today, cyber security updates, cyber updates, data breach, Exchange, Experts, Group, hacker, hacker news, hacking news, how to hack, information security, network security, Radar, ransomware malware, Servers, software vulnerability, Targeting, the hacker news, ToddyCat

Special Offers

  • Smart Home DIY Wireless Alarm Security System 4-Piece Kit for $69

    Smart Home DIY Wireless Alarm Security System 4-Piece Kit for $69
  • Flux 7 TWS Earbuds with Wireless Charging Case & Power Bank for $24

    Flux 7 TWS Earbuds with Wireless Charging Case & Power Bank for $24
  • MiniTool MovieMaker Ultimate Plan: Perpetual Lifetime License for $49

    MiniTool MovieMaker Ultimate Plan: Perpetual Lifetime License for $49
  • Robolly Graphic Automation: Lifetime Subscription for $29

    Robolly Graphic Automation: Lifetime Subscription for $29
  • Animation Desk Windows Pro Lite: Lifetime Subscription for $59

    Animation Desk Windows Pro Lite: Lifetime Subscription for $59

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

E-mail Newsletter

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

More Than You Know: The Enterprise Worth of Natural Language Generation 

Jun 24, 2022 By iHash

Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

Jun 24, 2022 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news Cyber Security cybersecurity cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS iOS 7 iOS 8 iPhone iPhone 6 Malware microsoft network security Privacy ransomware malware risk management security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

Smart Home DIY Wireless Alarm Security System 4-Piece Kit for $69

Expires June 25, 2122 23:59 PST Buy now and get 22% off KEY FEATURES Create a smart home with the Eco4life Wireless Alarm Security System 4-Piece Kit. With this system, you can monitor your home and alert you of any activity through cell phones, smart devices, and home automation systems. Use the eco4life app to […]

Elastic Contributors: Announcing New Features and Ways to Earn Points

Elastic Contributors: Announcing New Features and Ways to Earn Points

Table of Contents What’s new?1. Additional opportunities to earn bonus points2. We accept code contributions made to non-Elastic repositories3. Extra points for referring a contributor4. Dispute declined contributions5. View other participants’ contributions What’s new? 1. Additional opportunities to earn bonus points Contributors can now earn bonus points for submitting content in different solutions and contribution […]

Flux 7 TWS Earbuds with Wireless Charging Case & Power Bank for $24

Expires June 24, 2122 23:59 PST Buy now and get 75% off KEY FEATURES Using advanced noise-reduction technology, Flux 7 TWS earphones have been designed to reduce unwanted noise during exercise. With an onboard 2,000mAh polymer lithium battery that offers 5 hours of standby time, Flux 7 TWS earbuds are ideal for fitness enthusiasts who […]

“Above the Trend Line” – Your Industry Rumor Central for 6/23/2022

Above the Trend Line: your industry rumor central is a recurring feature of insideBIGDATA. In this column, we present a variety of short time-critical news items grouped by category such as M&A activity, people movements, funding news, industry partnerships, customer wins, rumors and general scuttlebutt floating around the big data, data science and machine learning […]

NSO Confirms Pegasus Spyware Used by at least 5 European Countries

The beleaguered Israeli surveillanceware vendor NSO Group this week admitted to the European Union lawmakers that its Pegasus tool was used by at least five countries in the region. “We’re trying to do the right thing and that’s more than other companies working in the industry,” Chaim Gelfand, the company’s general counsel and chief compliance […]

Tagmate Tracker for Google Analytics 4 Tracking: Lifetime Subscription for $49

Expires September 21, 2022 23:59 PST Buy now and get 98% off KEY FEATURES If you’re a web developer, marketing agency, or product manager, you know how hard it is to set up Google Analytics 4 tracking on your site. Especially when we talk about custom events like CTA Buttons, Form Submissions, Banners, Impressions, and […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2022
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT