Today > vulnerabilities   -   You can now download lists of IOCs here!

Hidden in Plain Sight: New Attack Chain Delivers Espionage RATs

Dec. 18, 2024, 12:37 p.m.

Description

An advanced persistent threat group, TA397, targeted a Turkish defense organization with a sophisticated attack chain. The campaign used a RAR archive containing a decoy PDF, a shortcut file, and an Alternate Data Stream with PowerShell code. The infection process involved creating a scheduled task to communicate with a staging domain and manually deploying WmRAT and MiyaRAT malware. These RATs enable intelligence gathering and data exfiltration. The attack utilized NTFS alternate data streams and masqueraded files to evade detection. TA397's infrastructure included separate staging and command and control domains. The threat actor's tactics, targeting, and malware indicate it is likely an intelligence collection effort supporting a South Asian government's interests.

Date

Published: Dec. 17, 2024, 8:58 p.m.

Created: Dec. 17, 2024, 8:58 p.m.

Modified: Dec. 18, 2024, 12:37 p.m.

Attack Patterns

MiyaRAT

WmRAT

TA397

T1036.006

T1053.005

T1560.001

T1059.003

T1059.001

T1095

T1113

T1071.001

T1518.001

T1204.002

T1016

T1082

T1057

T1105

T1566.001

T1083

T1027

Additional Informations

Defense

Madagascar