Welcome!

By registering with us, you'll be able to discuss, share and private message with other members of our community.

SignUp Now!
adv ex on 5 january 2024
adv ex on 22 February 2024
banner Expire 26 October 2024
Rescator cvv and dump shop
banner expire at 13 May

Yale lodge shop
UniCvv
banner Expire 1 April  2021

Transparent Tribe attacking diplomats and military in 27 countries

ALBERT

TRUSTED VENDOR
Staff member
Joined
Dec 3, 2020
Messages
1,355
Attackers use a tool designed to infect USB devices in their attacks.






The Transparent Tribe cybercriminal group (also known as PROJECTM and MYTHIC LEOPARD) has launched malicious campaigns against diplomats and military personnel in 27 countries. Most of the victims were located in Afghanistan, Pakistan, India, Iran and Germany. Attackers armed themselves with a new tool designed to infect USB devices and spread malware to other systems.

The attack chain begins with targeted phishing. Fraudulent messages are sent with malicious Microsoft Office documents containing an embedded macro to install the Crimson Remote Access Trojan. The Trojan is capable of many functions, including connecting to a C&C server to steal data, update malware remotely, take screenshots, and hack microphones and webcams for audio and video surveillance.

According to experts from Kaspersky Lab, the malware is capable of stealing files from removable media, performing keylogging and stealing credentials from browsers.

The Transparent Tribe also uses malware such as .NET-based Crimson and Python-based Peppy. In recent attacks, criminals have incorporated a new functionality into the Crimson Trojan called USBWorm. It consists of two main components: a tool to steal files from removable drives and a worm function to infect other vulnerable devices.

If a USB drive is connected to the infected PC, a copy of the Trojan is invisibly installed on the removable drive. The malware enumerates all the directories on the disk and then saves a copy of the Trojan in the root directory of the disk. The directory attribute is then changed to "hidden" and the fake Windows icon is used to entice victims to click and execute a payload when trying to access directories.
 
Top Bottom