• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Hydrochasma Group Targets Asian Medical and Shipping Sectors

You are here: Home / Cyber Security News / Hydrochasma Group Targets Asian Medical and Shipping Sectors

A new danger actor has been observed targeting transport firms and health care laboratories in Asia with phishing emails.

Dubbed “Hydrochasma” by Symantec cybersecurity scientists, the danger actor appears to have had a feasible interest in industries connected with COVID-19 treatments or vaccines.

“The infection vector utilized by Hydrochasma was most probably a phishing email,” reads an advisory posted by Symantec previously currently.

“The very first suspicious activity observed on machines is a entice document with a file identify in the sufferer organization’s native language that seems to indicate it was an email attachment.”

Right after obtaining preliminary obtain, the threat actors ended up noticed dropping Quick Reverse Proxy (FRP), a tool exposing a regional server sitting at the rear of a network handle translation (NAT) or firewall.

This, in flip, dropped a genuine Microsoft Edge update file along with a .dll file that is, in truth, the Meterpreter resource, which can be applied to perform remote access on target devices.

Symantec also noticed a number of further malware tools in contaminated devices, like the Gogo scanning device, the Cobalt Strike Beacon and Fscan, a publicly accessible port scanning instrument.

Additionally, Symantec explained it learned a shellcode loader and a corrupted moveable executable (PE) file on a victim’s network.

“While [we] didn’t observe facts remaining exfiltrated from sufferer equipment, some of the resources deployed by Hydrochasma do enable for distant entry and could perhaps be employed to exfiltrate info,” reads the advisory.

“The sectors focused also issue in direction of the inspiration behind this attack remaining intelligence gathering.”

In accordance to the corporation, the point that Hydrochasma did not use custom made malware is notable.

“Relying solely on residing-off-the-land and publicly available instruments can assistance make an attack stealthier although also producing attribution much more complicated,” Symantec described.

Healthcare is at the moment one of the most specific sectors globally by risk actors using phishing strategies, as demonstrated by new info from the Health care Information and facts and Management Programs Society.

Some parts of this article are sourced from:
www.infosecurity-journal.com

Previous Post: « Npm Packages Used to Distribute Phishing Links
Next Post: Open Source Flaws Found in 84% of Codebases »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • The Unusual Suspect: Git Repos
  • New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries
  • ⚡ Weekly Recap: Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More
  • CBI Shuts Down £390K U.K. Tech Support Scam, Arrests Key Operatives in Noida Call Center
  • eSIM Vulnerability in Kigen’s eUICC Cards Exposes Billions of IoT Devices to Malicious Attacks

Copyright © 2025 · AllTech.News, All Rights Reserved.