• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

New Hacking Cluster ‘Clasiopa’ Targeting Materials Research Organizations in Asia

You are here: Home / Cyber Security News / New Hacking Cluster ‘Clasiopa’ Targeting Materials Research Organizations in Asia

Elements analysis companies in Asia have been focused by a formerly mysterious threat actor using a distinct set of equipment.

Symantec, by Broadcom Program, is tracking the cluster below the moniker Clasiopa. The origins of the hacking team and its affiliations are at present mysterious, but there are hints that propose the adversary could have ties to India.

This features references to “SAPTARISHI-ATHARVAN-101” in a tailor made backdoor and the use of the password “iloveindea1998^_^” for a ZIP archive.

It can be worthy of noting that Saptarishi, indicating “Seven sages” in Sanskrit, refers to a team of seers who are revered in Hindu literature. Atharvan was an ancient Hindu priest and is believed to have co-authored a single of the 4 Vedas, a assortment of spiritual scriptures in Hinduism.

“Although these information could recommend that the team is dependent in India, it is also very most likely that the information and facts was planted as fake flags, with the password in unique seeming to be an extremely evident clue,” Symantec stated in a report shared with The Hacker News.

Also unclear is the exact suggests of initial entry, though it’s suspected that the cyber incursions choose gain of brute-power attacks on internet-facing servers.

Some of the essential hallmarks of the intrusions include clearing technique observe (Sysmon) and occasion logs as properly as the deployment of the multiple backdoors, this kind of as Atharvan and a modified variation of the open supply Lilith RAT, to acquire and exfiltrate delicate facts.

Atharvan is further more capable of calling a really hard-coded command-and-handle (C&C) server to retrieve files and run arbitrary executables on the contaminated host.

“The hard-coded C&C addresses seen in one particular of the samples analyzed to date was for Amazon AWS South Korea (Seoul) region, which is not a widespread locale for C&C infrastructure,” the corporation pointed out.

The disclosure will come a working day just after the cybersecurity company took the wraps off one more hitherto undocumented risk group known as Hydrochasma that has been observed targeting transport providers and health care laboratories in Asia.

Uncovered this write-up attention-grabbing? Stick to us on Twitter  and LinkedIn to study far more exceptional articles we put up.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « Lazarus Group Using New WinorDLL64 Backdoor to Exfiltrate Sensitive Data
Next Post: The Secret Vulnerability Finance Execs are Missing »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors
  • Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools
  • State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments
  • Securing Agentic AI: How to Protect the Invisible Identity Access
  • AsyncRAT’s Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe

Copyright © 2025 · AllTech.News, All Rights Reserved.