Threat Actor Targets Manufacturing Industry With Malware
Dec. 6, 2024, 4:25 p.m.
Tags
External References
Description
A sophisticated cyberattack campaign targeting the manufacturing industry has been identified, utilizing a deceptive LNK file disguised as a PDF document. The attack leverages multiple Living-off-the-Land Binaries and Google Accelerated Mobile Pages to evade detection. The threat actor employs various techniques, including DLL sideloading and process injection, to deploy Lumma Stealer and Amadey Bot. These malware strains enable the attacker to gain control and exfiltrate sensitive information from victim machines. The campaign's infection chain involves multiple stages of code injection and uses legitimate system tools to execute malicious PowerShell commands. The attackers demonstrate adaptability by using URL shortening and AMP URLs to bypass traditional security mechanisms.
Date
Published: Dec. 5, 2024, 5:33 p.m.
Created: Dec. 5, 2024, 5:33 p.m.
Modified: Dec. 6, 2024, 4:25 p.m.
Attack Patterns
Amadey Bot
Lumma Stealer
T1574
T1218
T1071
T1055
T1020
T1036
T1204
T1027
T1053
T1566
T1059
Additional Informations
Manufacturing