Hidden in Plain Sight: New Attack Chain Delivers Espionage RATs
Dec. 18, 2024, 12:37 p.m.
Tags
External References
Description
An advanced persistent threat group, TA397, targeted a Turkish defense organization with a sophisticated attack chain. The campaign used a RAR archive containing a decoy PDF, a shortcut file, and an Alternate Data Stream with PowerShell code. The infection process involved creating a scheduled task to communicate with a staging domain and manually deploying WmRAT and MiyaRAT malware. These RATs enable intelligence gathering and data exfiltration. The attack utilized NTFS alternate data streams and masqueraded files to evade detection. TA397's infrastructure included separate staging and command and control domains. The threat actor's tactics, targeting, and malware indicate it is likely an intelligence collection effort supporting a South Asian government's interests.
Date
Published: Dec. 17, 2024, 8:58 p.m.
Created: Dec. 17, 2024, 8:58 p.m.
Modified: Dec. 18, 2024, 12:37 p.m.
Attack Patterns
MiyaRAT
WmRAT
TA397
T1036.006
T1053.005
T1560.001
T1059.003
T1059.001
T1095
T1113
T1071.001
T1518.001
T1204.002
T1016
T1082
T1057
T1105
T1566.001
T1083
T1027
Additional Informations
Defense
Madagascar