AGL 40.00 No Change ▼ 0.00 (0%)
AIRLINK 129.06 Decreased By ▼ -0.47 (-0.36%)
BOP 6.75 Increased By ▲ 0.07 (1.05%)
CNERGY 4.49 Decreased By ▼ -0.14 (-3.02%)
DCL 8.55 Decreased By ▼ -0.39 (-4.36%)
DFML 40.82 Decreased By ▼ -0.87 (-2.09%)
DGKC 80.96 Decreased By ▼ -2.81 (-3.35%)
FCCL 32.77 No Change ▼ 0.00 (0%)
FFBL 74.43 Decreased By ▼ -1.04 (-1.38%)
FFL 11.74 Increased By ▲ 0.27 (2.35%)
HUBC 109.58 Decreased By ▼ -0.97 (-0.88%)
HUMNL 13.75 Decreased By ▼ -0.81 (-5.56%)
KEL 5.31 Decreased By ▼ -0.08 (-1.48%)
KOSM 7.72 Decreased By ▼ -0.68 (-8.1%)
MLCF 38.60 Decreased By ▼ -1.19 (-2.99%)
NBP 63.51 Increased By ▲ 3.22 (5.34%)
OGDC 194.69 Decreased By ▼ -4.97 (-2.49%)
PAEL 25.71 Decreased By ▼ -0.94 (-3.53%)
PIBTL 7.39 Decreased By ▼ -0.27 (-3.52%)
PPL 155.45 Decreased By ▼ -2.47 (-1.56%)
PRL 25.79 Decreased By ▼ -0.94 (-3.52%)
PTC 17.50 Decreased By ▼ -0.96 (-5.2%)
SEARL 78.65 Decreased By ▼ -3.79 (-4.6%)
TELE 7.86 Decreased By ▼ -0.45 (-5.42%)
TOMCL 33.73 Decreased By ▼ -0.78 (-2.26%)
TPLP 8.40 Decreased By ▼ -0.66 (-7.28%)
TREET 16.27 Decreased By ▼ -1.20 (-6.87%)
TRG 58.22 Decreased By ▼ -3.10 (-5.06%)
UNITY 27.49 Increased By ▲ 0.06 (0.22%)
WTL 1.39 Increased By ▲ 0.01 (0.72%)
BR100 10,445 Increased By 38.5 (0.37%)
BR30 31,189 Decreased By -523.9 (-1.65%)
KSE100 97,798 Increased By 469.8 (0.48%)
KSE30 30,481 Increased By 288.3 (0.95%)

ISLAMABAD: Kaspersky Global Research and Analysis team (GReAT) has uncovered a malicious global campaign in which attackers used Telegram to deliver Trojan spyware, potentially targeting individuals and businesses in the fintech and trading industries in different countries including Pakistan.

According to the report of the GReAT released on Friday, the malware is designed to steal sensitive data, such as passwords, and take control of users’ devices for espionage purposes. This phenomenon has also been witnessed in multiple countries across Europe, Asia including Pakistan, Latin America, and the Middle East.

The campaign is believed to be linked to DeathStalker, an infamous hack-for-hire APT (Advanced Persistent Threat) actor offering specialized hacking and financial intelligence services. In the recent wave of attacks observed by Kaspersky, threat actors attempted to infect victims with DarkMe malware – a Remote Access Trojan (RAT), designed to steal information and execute remote commands from a server controlled by the perpetrators.

They typically target small and medium businesses, financial, fintech, law firms, and on a few occasions, governmental entities. Despite going after these types of targets, DeathStalker has never been observed stealing funds, which is why Kaspersky believes it to be a private intelligence outfit.

The infection chain analysis reveals the attackers were most likely attaching malicious archives to posts in Telegram channels. The archives themselves, such as RAR or ZIP files, were not malicious, but they contained harmful files with extensions like .LNK, .com, and .cmd. If potential victims launched these files, it leads to the installation of the final-stage malware, DarkMe, in a series of actions.

In addition to using Telegram for malware delivery, the attackers improved their operational security and post-compromise cleanup. After installation, the malware removed the files used to deploy the DarkMe implant. To further hinder analysis and try to evade detection, perpetrators increased the implant’s file size and deleted other footprints, such as post-exploitation files, tools, and registry keys, after achieving their goal.

Copyright Business Recorder, 2024

Comments

Comments are closed.