Skip to content

Cyber Security And Bitcoin Blockchain News

The World

  • CRO Coin Falls 19% After Crypto.com Announces Rewards Cut Down To Cardholders bitcoin news
  • Coinbase Ventures Backed Startup to Build Pan-African Crypto Exchange With $23 Million Capital Raise – Finance Bitcoin News bitcoin news
  • Strong US Dollar Posts 5-Week High, Markets Price in a 75 bps Fed Rate Hike for June – Economics Bitcoin News bitcoin news
  • Ripple (XRP) Price Picks Up As SEC Legal Showdown Drags On bitcoin news
  • Ethereum Exchange Inflows Decline As Sellers Cool Off, Will Price Follow? bitcoin news
  • Russian Hackers Targeting Diplomatic Entities in Europe, Americas, and Asia cyber security news
  • How to Improve Margins and Scale-Up Service Delivery cyber security news
  • ‘A Dark Day for Crypto’ — A Deep Dive Into the Obliterated Terra Token Ecosystem and Damaged Apps – Bitcoin News bitcoin news

Experts Detail 3 Hacking Teams Working Under the Umbrella of TA410 Group

Posted on May 2, 2022 By root No Comments on Experts Detail 3 Hacking Teams Working Under the Umbrella of TA410 Group


Umbrella of TA410 Group

A cyberespionage threat actor known for targeting a variety of critical infrastructure sectors in Africa, the Middle East, and the U.S. has been observed using an upgraded version of a remote access trojan with information stealing capabilities.

Calling TA410 an umbrella group comprised of three teams dubbed FlowingFrog, LookingFrog, and JollyFrog, Slovak cybersecurity firm ESET assessed that “these subgroups operate somewhat independently, but that they may share intelligence requirements, an access team that runs their spear-phishing campaigns, and also the team that deploys network infrastructure.”

TA410 — said to share behavioral and tooling overlaps with APT10 (aka Stone Panda or TA429) — has a history of targeting U.S.-based organizations in the utilities sector as well as diplomatic entities in the Middle East and Africa.

Other identified victims of the hacker collective include a manufacturing company in Japan, a mining business in India, and a charity in Israel, in addition to unnamed victims in the education and military verticals.

TA410 was first documented by Proofpoint in August 2019 when the threat actor unleashed phishing campaigns containing macro-laden documents to compromise utility providers across the U.S. with a modular malware called LookBack.

Nearly a year later, the group returned with a new backdoor codenamed FlowCloud, also delivered to U.S. utilities providers, that Proofpoint described as malware that gives attackers complete control over infected systems.

TA410 Group

“Its remote access trojan (RAT) functionality includes the ability to access installed applications, the keyboard, mouse, screen, files, services, and processes with the ability to exfiltrate information via command-and-control,” the company noted in June 2020.

Industrial cybersecurity firm Dragos, which tracks the activity group under the moniker TALONITE, pointed out the adversary’s penchant for blending techniques and tactics in order to ensure a successful intrusion.

“TALONITE focuses on subverting and taking advantage of trust with phishing lures focusing on engineering-specific themes and concepts, malware that abuses otherwise legitimate binaries or modifies such binaries to include additional functionality, and a combination of owned and compromised network infrastructure,” Dragos said in April 2021.

TA410 Group

ESET’s investigation into the hacking crew’s modus operandi and toolset has shed light on a new version of FlowCloud, which comes with the ability to record audio using a computer’s microphone, monitor clipboard events, and control attached camera devices to take pictures.

Specifically, the audio recording function is designed to be automatically triggered when sound levels near the compromised computer cross a 65-decibel threshold.

TA410 is also known to take advantage of both spear-phishing and vulnerable internet-facing applications such as Microsoft Exchange, SharePoint, and SQL Servers to gain initial access.

CyberSecurity

“This indicates to us that their victims are targeted specifically, with the attackers choosing which entry method has the best chance of infiltrating the target,” ESET malware researcher Alexandre Côté Cyr said.

Each team within the TA410 umbrella is said to use different toolsets. While JollyFrog relies on off-the-shelf malware such as QuasarRAT and Korplug (aka PlugX), LookingFrog uses X4, a barebones implant with remote control features, and LookBack.

FlowingFrog, in contrast, employs a downloader called Tendyron that’s delivered by means of the Royal Road RTF weaponizer, using it to download FlowCloud as well as a second backdoor, which is based on Gh0stRAT (aka Farfli).

“TA410 is a cyberespionage umbrella targeting high-profile entities such as governments and universities worldwide,” ESET said. “Even though the JollyFrog team uses generic tools, FlowingFrog and LookingFrog have access to complex implants such as FlowCloud and LookBack.”





TheHackersNews/

cyber security news

Post navigation

Previous Post: QNAP Advises to Mitigate Remote Hacking Flaws Until Patches are Available
Next Post: Analysts Predict ApeCoin To Hit $50 By End Of 2025

Related Posts

  • U.S. Charges Venezuelan Doctor for Using and Selling Thanos Ransomware cyber security news
  • How to Protect Your Data When Ransomware Strikes cyber security news
  • Chinese “Twisted Panda” Hackers Caught Spying on Russian Defense Institutes cyber security news
  • What You Need to Know to Stay Resilient cyber security news
  • Cisco Issues Patches for 3 New Flaws Affecting Enterprise NFVIS Software cyber security news
  • Ukrainian CERT Warns Citizens of a New Wave of Attacks Distributing Jester Malware cyber security news

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • May 2022

Categories

  • bitcoin news
  • cyber security news

Recent Posts

  • How Ethereum Uniswap Reached A Milestone Of $1T In Trading Volume
  • Russian Court Recognizes Cryptocurrency as Means of Payment, Prosecutors See Precedent – Regulation Bitcoin News
  • Bitcoin, Ethereum Exchange Inflows Suggest Sell-Offs Are Far From Over
  • SOL, NEAR Fall Over 10% During Tuesday’s Session – Market Updates Bitcoin News
  • Popular PyPI Package ‘ctx’ and PHP Library ‘phpass’ Hijacked to Steal AWS Keys

Recent Comments

No comments to show.
  • Bitcoin Marks Seven Consecutive Red Candles, Paints Gruesome Picture For Market bitcoin news
  • Critical Gems Takeover Bug Reported in RubyGems Package Manager cyber security news
  • The Bullish Signal That Could Save Bitcoin bitcoin news
  • E.U. Blames Russia for Cyberattack on KA-SAT Satellite Network Operated by Viasat cyber security news
  • Turkey’s Inflation Rate Surges to 70%, Monthly Rate of Change Now 7.25% – Economics Bitcoin News bitcoin news
  • Russian Crypto Mining Giant Bitriver Considers Challenging US Sanctions – Mining Bitcoin News bitcoin news
  • Market Downtrend Trigger Bitcoin Inflows From Institutional Investors bitcoin news
  • Spanish Cryptocurrency Exchange Bit2me Expands Operations to Brazil – Exchanges Bitcoin News bitcoin news

Copyright © 2022 Cyber Security And Bitcoin Blockchain News.

Powered by PressBook News Dark theme