ericWadeFord · @ericWadeFord
3 followers · 8 posts · Server infosec.exchange

New Malware M2RAT Steals Sensitive Data

AhnLab details an incident where cybercriminals used a new malware they dubbed delivered through phishing email attachments. The malware can exfiltrate process information, keylogging, and document and voice files, including those from connected portable devices. The malware will periodically capture screenshots, but the cybercriminal can issue a command to capture those when desired. M2RAT uses a shared memory section for C2 communication, the transfer of stolen data to the C2 without storing them in the compromised system, and data exfiltration. AhnLab attributed the attack to APT37 (RedEyes, ScarCruft), basing their attribution on the techniques employed having been used by

blog.talosintelligence.com/new

#m2rat #apt37 #cti #threatintel

Last updated 2 years ago

Sheik · @sheikeinstein
65 followers · 80 posts · Server infosec.exchange
lazarusholic · @lazarusholic
0 followers · 13 posts · Server infosec.exchange

"스테가노그래피 기법 사용한 한글(HWP) 악성코드 : RedEyes(ScarCruft)" published by Ahnlab. , , , -2017-8291, , , asec.ahnlab.com/ko/47622/

#steganography #redeyes #m2rat #cve #cti #osint #lazarus

Last updated 2 years ago