AGL 40.00 Decreased By ▼ -0.01 (-0.02%)
AIRLINK 127.00 Decreased By ▼ -0.99 (-0.77%)
BOP 6.68 Increased By ▲ 0.08 (1.21%)
CNERGY 4.49 Decreased By ▼ -0.11 (-2.39%)
DCL 8.60 Increased By ▲ 0.12 (1.42%)
DFML 41.30 Decreased By ▼ -0.18 (-0.43%)
DGKC 86.71 Increased By ▲ 0.13 (0.15%)
FCCL 32.16 Increased By ▲ 0.02 (0.06%)
FFBL 64.70 Decreased By ▼ -0.72 (-1.1%)
FFL 10.29 Increased By ▲ 0.04 (0.39%)
HUBC 109.51 Decreased By ▼ -0.98 (-0.89%)
HUMNL 14.90 Increased By ▲ 0.15 (1.02%)
KEL 5.05 Decreased By ▼ -0.08 (-1.56%)
KOSM 7.40 Increased By ▲ 0.28 (3.93%)
MLCF 41.39 Decreased By ▼ -0.26 (-0.62%)
NBP 60.60 Increased By ▲ 0.51 (0.85%)
OGDC 190.00 Decreased By ▼ -4.69 (-2.41%)
PAEL 27.81 Decreased By ▼ -0.14 (-0.5%)
PIBTL 7.75 Decreased By ▼ -0.25 (-3.13%)
PPL 149.75 Decreased By ▼ -1.42 (-0.94%)
PRL 26.73 Decreased By ▼ -0.15 (-0.56%)
PTC 16.18 Increased By ▲ 0.18 (1.13%)
SEARL 86.02 Increased By ▲ 7.82 (10%)
TELE 7.72 Increased By ▲ 0.33 (4.47%)
TOMCL 35.58 Decreased By ▼ -0.09 (-0.25%)
TPLP 8.14 Increased By ▲ 0.23 (2.91%)
TREET 16.51 Increased By ▲ 0.62 (3.9%)
TRG 53.35 Increased By ▲ 0.59 (1.12%)
UNITY 26.28 Decreased By ▼ -0.27 (-1.02%)
WTL 1.26 Decreased By ▼ -0.01 (-0.79%)
BR100 9,889 Decreased By -31.1 (-0.31%)
BR30 30,611 Decreased By -140.9 (-0.46%)
KSE100 93,355 Increased By 130.9 (0.14%)
KSE30 28,931 Increased By 46 (0.16%)

ISLAMABAD: Kaspersky Global Research and Analysis team (GReAT) has uncovered a malicious global campaign in which attackers used Telegram to deliver Trojan spyware, potentially targeting individuals and businesses in the fintech and trading industries in different countries including Pakistan.

According to the report of the GReAT released on Friday, the malware is designed to steal sensitive data, such as passwords, and take control of users’ devices for espionage purposes. This phenomenon has also been witnessed in multiple countries across Europe, Asia including Pakistan, Latin America, and the Middle East.

The campaign is believed to be linked to DeathStalker, an infamous hack-for-hire APT (Advanced Persistent Threat) actor offering specialized hacking and financial intelligence services. In the recent wave of attacks observed by Kaspersky, threat actors attempted to infect victims with DarkMe malware – a Remote Access Trojan (RAT), designed to steal information and execute remote commands from a server controlled by the perpetrators.

They typically target small and medium businesses, financial, fintech, law firms, and on a few occasions, governmental entities. Despite going after these types of targets, DeathStalker has never been observed stealing funds, which is why Kaspersky believes it to be a private intelligence outfit.

The infection chain analysis reveals the attackers were most likely attaching malicious archives to posts in Telegram channels. The archives themselves, such as RAR or ZIP files, were not malicious, but they contained harmful files with extensions like .LNK, .com, and .cmd. If potential victims launched these files, it leads to the installation of the final-stage malware, DarkMe, in a series of actions.

In addition to using Telegram for malware delivery, the attackers improved their operational security and post-compromise cleanup. After installation, the malware removed the files used to deploy the DarkMe implant. To further hinder analysis and try to evade detection, perpetrators increased the implant’s file size and deleted other footprints, such as post-exploitation files, tools, and registry keys, after achieving their goal.

Copyright Business Recorder, 2024

Comments

200 characters