AIRLINK 212.82 Increased By ▲ 3.27 (1.56%)
BOP 10.25 Decreased By ▼ -0.21 (-2.01%)
CNERGY 7.00 Decreased By ▼ -0.35 (-4.76%)
FCCL 33.47 Decreased By ▼ -0.92 (-2.68%)
FFL 17.64 Decreased By ▼ -0.41 (-2.27%)
FLYNG 21.82 Decreased By ▼ -1.10 (-4.8%)
HUBC 129.11 Decreased By ▼ -3.38 (-2.55%)
HUMNL 13.86 Decreased By ▼ -0.28 (-1.98%)
KEL 4.86 Decreased By ▼ -0.17 (-3.38%)
KOSM 6.93 Decreased By ▼ -0.14 (-1.98%)
MLCF 43.63 Decreased By ▼ -1.57 (-3.47%)
OGDC 212.95 Decreased By ▼ -5.43 (-2.49%)
PACE 7.22 Decreased By ▼ -0.36 (-4.75%)
PAEL 41.17 Decreased By ▼ -0.53 (-1.27%)
PIAHCLA 16.83 Decreased By ▼ -0.47 (-2.72%)
PIBTL 8.63 Increased By ▲ 0.08 (0.94%)
POWERPS 12.50 No Change ▼ 0.00 (0%)
PPL 183.03 Decreased By ▼ -6.00 (-3.17%)
PRL 39.63 Decreased By ▼ -2.70 (-6.38%)
PTC 24.73 Decreased By ▼ -0.44 (-1.75%)
SEARL 98.01 Decreased By ▼ -5.95 (-5.72%)
SILK 1.01 Decreased By ▼ -0.02 (-1.94%)
SSGC 41.73 Increased By ▲ 2.49 (6.35%)
SYM 18.86 Decreased By ▼ -0.30 (-1.57%)
TELE 9.00 Decreased By ▼ -0.24 (-2.6%)
TPLP 12.40 Decreased By ▼ -0.70 (-5.34%)
TRG 65.68 Decreased By ▼ -3.50 (-5.06%)
WAVESAPP 10.98 Increased By ▲ 0.26 (2.43%)
WTL 1.79 Increased By ▲ 0.08 (4.68%)
YOUW 4.03 Decreased By ▼ -0.11 (-2.66%)
BR100 11,866 Decreased By -213.1 (-1.76%)
BR30 35,697 Decreased By -905.3 (-2.47%)
KSE100 114,148 Decreased By -1904.2 (-1.64%)
KSE30 35,952 Decreased By -625.5 (-1.71%)

ISLAMABAD: Kaspersky Global Research and Analysis team (GReAT) has uncovered a malicious global campaign in which attackers used Telegram to deliver Trojan spyware, potentially targeting individuals and businesses in the fintech and trading industries in different countries including Pakistan.

According to the report of the GReAT released on Friday, the malware is designed to steal sensitive data, such as passwords, and take control of users’ devices for espionage purposes. This phenomenon has also been witnessed in multiple countries across Europe, Asia including Pakistan, Latin America, and the Middle East.

The campaign is believed to be linked to DeathStalker, an infamous hack-for-hire APT (Advanced Persistent Threat) actor offering specialized hacking and financial intelligence services. In the recent wave of attacks observed by Kaspersky, threat actors attempted to infect victims with DarkMe malware – a Remote Access Trojan (RAT), designed to steal information and execute remote commands from a server controlled by the perpetrators.

They typically target small and medium businesses, financial, fintech, law firms, and on a few occasions, governmental entities. Despite going after these types of targets, DeathStalker has never been observed stealing funds, which is why Kaspersky believes it to be a private intelligence outfit.

The infection chain analysis reveals the attackers were most likely attaching malicious archives to posts in Telegram channels. The archives themselves, such as RAR or ZIP files, were not malicious, but they contained harmful files with extensions like .LNK, .com, and .cmd. If potential victims launched these files, it leads to the installation of the final-stage malware, DarkMe, in a series of actions.

In addition to using Telegram for malware delivery, the attackers improved their operational security and post-compromise cleanup. After installation, the malware removed the files used to deploy the DarkMe implant. To further hinder analysis and try to evade detection, perpetrators increased the implant’s file size and deleted other footprints, such as post-exploitation files, tools, and registry keys, after achieving their goal.

Copyright Business Recorder, 2024

Comments

Comments are closed.