• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Dark Pink APT Group Deploys KamiKakaBot Against South Asian Entities

You are here: Home / Cyber Security News / Dark Pink APT Group Deploys KamiKakaBot Against South Asian Entities

The threat actor recognized as Dark Pink has been affiliated with deployments of the KamiKakaBot malware versus a number of governing administration entities in ASEAN (Association of Southeast Asian Nations) countries.

Risk researchers at EclecticIQ discussed the conclusions in a website submit released very last 7 days, detailing the noticed assaults took place in February.

“In this new campaign, the romantic relationship between Europe and ASEAN nations around the world is very likely remaining exploited in the form of social engineering lures in opposition to armed service and governing administration entities in Southeast Asian nations,” the report explained. 

“Although researchers absence the conclusive proof required to attribute the nationality of this group, the targets of the attackers and some of the designs recommend that the Dark Pink team could probably be a Chinese APT group.”

The group additional that the destructive strategies have been nearly similar to people earlier found by Team-IB.

“In January 2023, the threat actors used ISO photographs to produce KamiKakaBot, which was executed making use of a DLL side-loading strategy,” reads the EclecticIQ article. “The key change in the February campaign is that the malware’s obfuscation plan has improved to much better evade anti-malware steps.”

Go through a lot more on that campaign in this article: New APT Dark Pink Hits Asia-Pacific, Europe With Spear Phishing Practices

The KamiKakaBot malware, shipped through phishing e-mail during Dark Pink’s most current assaults, aims to steal credentials, browsing history and cookies from browsers like Chrome, Edge and Firefox. The malware also features remote code execution (RCE) capabilities.

“Developers of KamiKakaBot employ several evasion tactics to remain undetected whilst executing destructive actions on infected units,” EclecticIQ wrote. “For case in point, they use dwelling-off-the-land binaries (LOLBINs) […] to operate the KamiKakaBot malware on victims’ devices.”

They also used authentic web solutions as a Command and Command (C2) server, specifically Telegram, to further cover their malicious intentions.

To safeguard systems against Dark Pink and comparable threats, EclecticIQ suggests organizations use harmless DLL search mode, disable mounting ISO photographs by means of team coverage and disable browser password saving also through group plan, as effectively as deploy the highest degree of safety on firewalls and endpoints.

The company’s advisory will come months soon after info from Proofpoint recommended phone assaults and multi-element authentication (MFA) bypass strategies have been driving phishing attacks upward in 2022.

Some parts of this article are sourced from:
www.infosecurity-journal.com

Previous Post: « Remote Code Execution and Camera Access Flaws Found in Smart Intercoms
Next Post: Fortinet FortiOS Flaw Exploited in Targeted Cyberattacks on Government Entities »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware
  • Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play
  • Malicious Pull Request Infects 6,000+ Developers via Vulnerable Ethcode VS Code Extension
  • 5 Ways Identity-based Attacks Are Breaching Retail
  • RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks

Copyright © 2025 · AllTech.News, All Rights Reserved.