• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Governments Targeted by Discord-Based Threat Campaign

You are here: Home / Cyber Security News / Governments Targeted by Discord-Based Threat Campaign

An unknown menace actor is focusing on APAC and North American governments with information-stealing malware and ransomware, in accordance to Menlo Security.

The group’s assaults commence with a phishing email made up of a malicious Discord hyperlink, which points to a password-safeguarded zip file. That in switch consists of a .NET malware downloader identified as PureCrypter.

The loader will attempt to download a secondary payload from the group’s command and control (C2) infrastructure, which is a compromised domain belonging to a non-revenue, Menlo Security said.

Among the the destructive payloads observed by the security seller in this campaign are various facts-stealers and ransomware variants: Redline Stealer, AgentTesla, Eternity, Blackmoon and Philadelphia ransomware.

In the sample analyzed by security gurus, PureCrypter makes an attempt to obtain AgentTesla, an advanced backdoor designed to steal browser-dependent passwords, as very well as get display captures and log keystrokes.

“In our investigation, we found that AgentTesla establishes a relationship to an FTP server the place it retailers the stolen victim’s credentials. The FTP server appears to have been taken above and the leaked qualifications for the area ended up discovered on the internet, hence suggesting that the threat actors employed these credentials to obtain accessibility to the server,” the report disclosed.

“The FTP server was also witnessed in a marketing campaign making use of OneNote to produce malware. Attackers have been sending phishing e-mail with one-way links to destructive OneNote documents that can obtain more malware or steal data from the victim’s product. Altogether, the labs group uncovered 106 information utilizing claimed FTP server.”

AgentTesla has been close to for many several years but proceeds to prove well-liked among threat actors.

The distant access Trojan (RAT) and details-stealer was the most greatly made use of malware in October 2022, accounting for 7% of world detections by Test Stage Program.

The malware stood at third place on the vendor’s regular World-wide Threat Index report for January 2023.

Editorial credit rating icon image: Ink Fall / Shutterstock.com

Some parts of this article are sourced from:
www.infosecurity-journal.com

Previous Post: « PureCrypter Malware Targets Government Entities in Asia-Pacific and North America
Next Post: ChromeLoader Malware Targeting Gamers via Fake Nintendo and Steam Game Hacks »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Deepfake Defense in the Age of AI
  • North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress
  • Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
  • Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers
  • ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files

Copyright © 2025 · AllTech.News, All Rights Reserved.