• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

TetrisPhantom: Cyber Espionage via Secure USBs Targets APAC Governments

You are here: Home / Cyber Security News / TetrisPhantom: Cyber Espionage via Secure USBs Targets APAC Governments

Government entities in the Asia-Pacific (APAC) area are the target of a prolonged-jogging cyber espionage marketing campaign dubbed TetrisPhantom.

“The attacker covertly spied on and harvested delicate information from APAC federal government entities by exploiting a distinct style of protected USB drive, guarded by hardware encryption to make certain the secure storage and transfer of data between laptop methods,” Kaspersky mentioned in its APT tendencies report for Q3 2023.

The Russian cybersecurity company, which detected the ongoing exercise in early 2023, claimed the USB drives present hardware encryption and are employed by federal government businesses worldwide to securely retail outlet and transfer knowledge, elevating the risk that the assaults could broaden in the potential to have a worldwide footprint.

The clandestine intrusion set has not been connected to any recognized danger actor or team, but the high-amount of sophistication of the campaign details to a nation-point out crew.

“These functions ended up done by a extremely experienced and resourceful threat actor, with a eager desire in espionage actions within just sensitive and safeguarded federal government networks,” Noushin Shabab, senior security researcher at Kaspersky, said. “The assaults ended up very focused and experienced a quite constrained selection of victims.”

A key hallmark of the campaign is the use of numerous destructive modules to execute instructions and collect information and details from compromised machines and propagate the infection to other devices working with the very same or other protected USB drives as a vector.

The malware components, aside from self-replicating by connected protected USB drives to breach air-gapped networks, are also capable of executing other destructive data files on the infected methods.

“The attack contains sophisticated resources and techniques,” Kaspersky mentioned, introducing the attack sequences also entailed the “injection of code into a legitimate accessibility management system on the USB drive which functions as a loader for the malware on a new device.”

The disclosure will come as a new and mysterious highly developed persistent risk (APT) actor has been connected to a set of attacks concentrating on govt entities, army contractors, universities, and hospitals in Russia by means of spear-phishing e-mails that contains booby-trapped Microsoft Workplace files.

“This initiates a multi-amount an infection plan primary to the installation of a new Trojan, which is mainly made to exfiltrate data files from the victim’s machine and attain management by executing arbitrary commands,” Kaspersky said.

The attacks, codenamed BadRory by the firm, played out in the variety of two waves – 1 in Oct 2022, adopted by a 2nd in April 2023.

Uncovered this short article exciting? Abide by us on Twitter  and LinkedIn to study much more distinctive content material we submit.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « New Admin Takeover Vulnerability Exposed in Synology’s DiskStation Manager
Next Post: Unraveling Real-Life Attack Paths – Key Lessons Learned »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit
  • BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan
  • Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea Laundering
  • CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users
  • Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns

Copyright © 2025 · AllTech.News, All Rights Reserved.