Breaking News
- New Research calls for a reset for effective Hybrid Working Strategies Poly & Worktech Academy
- Methane Electrolysis Can Decarbonize LNG/LPG Imports and Achieve EU’s Climate Targets
- Esri Collaborates with RB Rail AS to Build Sustainable Rail Infrastructure in EU
- Watts Water Technologies Completes WAVE Water Stewardship Verification
- Bacardi Limited Welcomes Consumer Goods Executive Dave Ingram to Lead Operations
- Tavneos® (avacopan) recommended by England’s NICE for the treatment of AAV (GPA/MPA)
- Algeria-Ethiopia: Need to create mixed Pharmaceutical industrial poles tackled
- Mostaganem beaches : 1 million-plus summer visitors recorded last weekend
- Backdoor computer malware in Africa skyrocketed in the second quarter of 2022, Kaspersky
- Carbon Opportunities Fund Launches First-of-its-Kind Investment Platform to Issue Tokenized Carbon Credits
- Blockchain protocol for metaverses, Meta0, to launch at Gamescom
- upGrad Appoints Myleeta AgaWilliams as CEO – International, in Push to Expand its Global Edtech Business
- Vervotech Strengthens Its Position by Adding Rehlat to Its Strong Client Portfolio
- ENJOY A FAMILY HOMECATION WITH LG TVS
- Boomi Named One of Americas Fastest-Growing Private Companies on Inc. 5000 2022 List
- Board International Named as a Representative Vendor in 2022 Gartner® Market Guide for Cloud Extended Planning and Analysis Solutions
- Veracode Unveils Velocity Partner Program™
- South Africa's TymeBank acquires Retail Capital fintech to bolster business banking offering
- Air Algérie launches twice-weekly service to Doha
- Andersen Global Adds Collaborating Firm in Montserrat
- Quectel Announces New Generation SC200E LTE Smart Module Series to Power High-Demand AIoT Applications
- Bests Market Segment Report: Two Years After Beirut Blast, Operating Environment Remains Gruelling for Lebanese Insurers
- Approaching 40 Years, Rimkus Consulting Group, Inc. Rebrands as Rimkus
- FEELM Granted e-Cigarette Production License
- Acronis recognized as a high performer in the Canalys Endpoint Security Vendor Performance Index for Q1 2022
- Nubank & Other Neobanks: Will They Change the Game?
- Xlear Files Amended Answer to the Government’s Lawsuit on COVID-19 Statements; Provides Still More Data In Support of Xlear’s Use as Additional Layer of Protection
- UAE’s Gulftainer Marks One Million Man Hours without AccidentIncredible Efforts Lead to New Awards
- A Candidate For Guinness World Records, Nur Sultan Grand Mosque is Open to Visitors!
- When it comes to growing your cloud solutions business, customers are looking for value, not cheap solutions, Routed
- Magnora's solar PV project in South Africa receives Environmental Authorization
- NewMed, Enlight Energy announce JV to develop renewable energy projects across North Africa and the Middle East
- A New Chapter in IT Services: Lenovo PCCW Solutions Starts First Day of Operation as a New Company
- Energy Vault and Jupiter Power Announce Agreement for Battery Energy Storage Projects in Texas and California Totaling 220 MWh
- Iraq Stock Exchange volumes decreased 67% in July.
- QNET Launches FinGreen Financial Literacy Programme to Empower Women and Youth in Emerging Economies
- LM Exchange significantly improved its efficiency and regulatory compliance by adopting artificial intelligence-aided technology
- President Uhuru presides over countrywide roll-out of coding curriculum in schools
- Google’s Equiano undersea cable finally lands in South Africa
- Heatwave: Sonelgaz expects electricity consumption records
- Dubai Electricity and Water Authority PJSC announces AED 12.08 billion revenue and 3.30 billion net profit in the first half of 2022
- Mary Kay Inc. Continues Its Support of Women’s Empowerment at the International Women’s Forum Cornerstone Conference in Chile
- Webb Fontaine launches Niger national single window to bolster trade
- Rural development negotiates a settlement to clear Citrus Blocked in the EU Ports
- Nigerian fintech startup TeamApt secures funding to widen credit offerings
- Sharjah Finance Department launches the second cycle of the ''Sharjah Award for Public Finance'' with new categories and developed criteria
- Budweiser Celebrates 100 Days to The FIFA World Cup™ by Partnering with Messi, Neymar Jr. and Sterling to Drop Hundreds of Prizes For Fans Around the World
- Fujifilm and Qure.ai Join Hands With IHVN to Accelerate TB Screening in Rural Nigerian Communities
- ENERGY-SAVING SOLUTIONS FOR A SUSTAINABLE HOME
- ASM Global’s Coca-Cola Music Hall Celebrates First Anniversary as One of World’s Fastest-growing Venues
New advanced threat actor targets high-profile entities with new malware
Kaspersky researchers reported an ongoing campaign carried out by an advanced persistent threat (APT) group dubbed ToddyCat, which focuses on compromising multiple Microsoft Exchange servers using two malicious programs – Samurai backdoor and Ninja Trojan. The campaign primarily targeted government and military sectors in Europe and Asia.
ToddyCat is a relatively new sophisticated APT group, the activity of which was first detected by Kaspersky researchers in December 2020 when it carried out a number of attacks on the targets’ Microsoft Exchange servers. In February-March 2021, Kaspersky observed a quick escalation as ToddyCat started to abuse the ProxyLogon vulnerability on Microsoft Exchange Servers to compromise multiple organisations across Europe and Asia. Starting from September 2021 the group shifted its attention to desktop machines related to the government and diplomatic entities in Asia. The group constantly updates its arsenal and continues to perform attacks in 2022.
While it is unclear what the initial vector of infection for the latest activities is, the researchers have conducted a thorough analysis of the malware used in the campaigns. ToddyCat employs Samurai Backdoor and Ninja Trojan, two sophisticated cyber-espionage tools designed to penetrate deeply in targeted networks, whilst persistently maintaining stealth.
Samurai is a modular backdoor, is a final stage component of the attack that allows the attacker to administrate the remote system and move laterally within the compromised network. This malware stands out because it uses multiple control flow and case statements to jump between instructions, that makes it hard to track the order of actions in the code. Moreover, it is used to launch another new malware dubbed Ninja Trojan, a complex collaborative tool that allows multiple operators to work on the same machine simultaneously.
Ninja Trojan also provides a large set of commands, which allows the attackers to control remote systems while avoiding detection. It is usually loaded into the memory of a device and launched by various loaders. The Ninja Trojan starts the operation by retrieving configuration parameters from the encrypted payload, and then deeply infiltrates a compromised network. The capabilities of the malware include managing file systems, starting reverse shells, forwarding TCP packets and even taking control of the network in specific timeframes, which can be dynamically configured using a specific command.
The malware also resembles some other well-known post-exploitation frameworks, such as CobaltStrike, with Ninja’s features allowing it to limit the number of direct connections from the targeted network to the remote command and control systems without Internet access. In addition, it can control HTTP indicators and camouflage the malicious traffic in HTTP requests making them appear legitimate by modifying HTTP header and URL paths. These capabilities make Ninja Trojan particularly stealthy.
“ToddyCat is a sophisticated threat actor with elevated technical skills, which is able to fly under-the-radar and make its way into the top-level organisations. Despite the number of loaders and attacks discovered during the last year, we still don’t have complete visibility of their operations and tactics. Another noteworthy characteristic of ToddyCat is its focus on advanced malware capabilities – Ninja Trojan got its name for a reason – it is hard to detect and, therefore, hard to stop. The best way to face this kind of threat is to use multi-layer defenses, which provide information on internal assets and stay up-to-date with the latest threat intelligence,” says Giampaolo Dedola, security expert at Kaspersky.
africabusinesscommunities