Thứ Ba, Tháng Hai 7, 2023
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z
NATuts
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z
No Result
View All Result
NATuts
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z
No Result
View All Result
NATuts
No Result
View All Result
Home Tech

Meta disrupts cyber espionage in South Asia Facebook abuse

8 Tháng Tám, 2022
in Tech
0
Meta disrupts cyber espionage in South Asia Facebook abuse
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter

Các bài viết liên quan:

How to get travel insurance

Guide on how to get travel insurance with 4 options

24 Tháng Một, 2023
Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

8 Tháng Một, 2023
5 Best Software to Stream Games

5 Best Software to Stream Games

2 Tháng Một, 2023
IBM Bridge To Cloud For Power

IBM Bridge To Cloud For Power- Everything You Should Know

2 Tháng Một, 2023
Top 10 CRM Software For Construction 

Top 10 CRM Software For Construction Enterprises All The Time

31 Tháng Mười Hai, 2022
What Is IBM Software

What Is IBM Software? 4 Business Segments at IBM You Should Know

26 Tháng Mười Hai, 2022

Cyber ​​espionage activity

Meta’s parent company Facebook revealed that it had taken action against two South Asian espionage operations that had leveraged its social media platforms to distribute malware to potential targets.

The first set of operations is described by the company as “persistent and well-resourced” and is carried out by a hacking group that is tracked under the moniker Bitter APT (aka APT-C-08 or T-APT- 17) targeted individuals in New Zealand, IndiaPakistan and United Kingdom

“Bitter used a variety of malicious tactics to target people online with social engineering and infect their devices with malware,” Meta said in its Daily Competitor Threat Report. your precious. “They used a combination of link shortening services, malicious domains, compromised websites, and third-party hosting providers to distribute their malware.”

The attacks involved the threat actor creating fictional characters on the platform, posing as attractive young women to try to build trust with the targets and lure them into clicking links. bogus has deployed malware.

But in an interesting twist, the attackers convinced victims to download the iOS chat app through Apple TestFlight, a legitimate online service that can be used for beta testing apps and provides provide feedback to application developers.

“This means that hackers do not need to rely on exploits to deliver custom malware to their targets, and can use official Apple services to distribute apps to make apps seems more legit, as long as they convince people to download Apple Testflight and the researchers say tricked them into installing their chat app.

While the exact functionality of the app is unknown, it is suspected to have been used as a social engineering ploy as a means to monitor the campaign’s victims via a chat medium. organized for this purpose.

In addition, Bitter APT operators used previously undocumented Android malware called Dracarys, which abused the operating system’s access to install arbitrary applications. , record, take pictures and collect sensitive data from infected phones such as call logs, contacts, files, text messages, geolocation and device information.

Dracarys is distributed through trojanized drip apps like YouTube, Signal, Telegram, and WhatsApp, continuing the trend of attackers increasingly deploying malware masquerading as legitimate software to infiltrate mobile devices. motion.

Furthermore, in a sign of adaptation to the competition, Meta notes that the team has resisted its detection and prevention efforts by posting broken links or images of malicious links. on the chat thread, requiring the recipient to enter the link in their browser.

The origin of Bitter is a puzzle, there are not many indicators available to conclude with certainty with a particular country. It is believed to operate out of South Asia and has recently expanded its focus on attacking military features in Bangladesh.

Transparency Tribal Break Meta

The second collective to be disrupted by Meta was the Transparency Tribe (aka APT36), an advanced persistent threat believed to be based outside of Pakistan and with a track record of targeting government agencies in India and Afghanistan with specially designed malicious tools.

Last month, Cisco Talos attributed the actor to being part of an ongoing scam campaign targeting students at various educational institutions in India, marking a departure from its typical victim model to include users. Civil.

The latest infiltrations show a fusion of military personnel, government officials, human rights workers and other nonprofits, and students in Afghanistan, India, Pakistan, and Saudi Arabia. Ut and UAE.

Targets are designed on social networks using fake characters by posing as recruiters for both legitimate and fake companies, military or attractive young women who want to make a relationship romantically, eventually enticing them to open links hosting malware.

The downloaded files contain LazaSpy, a modified version of Android open-source surveillance software called XploitSPY that uses unofficial WhatsApp, WeChat, and YouTube clone apps to deliver a piece of malware. Other cargo damage is called Mobzsar (aka CapraSpy).

Both malware comes with features that collect call logs, contacts, files, text messages, geo-location, device information and photos, as well as activate the device’s microphone. , turning them into effective monitoring tools.

“This threat actor is a prime example of a global trend […] Where low-sophistication groups choose to rely on readily available malicious tools instead of investing in the development or purchase of sophisticated attack capabilities, the researchers said.

The “low cost basic tools” […] Requires less technical expertise to deploy, but still delivers results for attackers, the company said, adding that it “democratizes access to attack capabilities and monitoring when the barrier to entry is getting lower and lower. “

.

Previous Post

Download Bluebeam Revu 20 – Detailed installation instruction video

Next Post

How to Do Venmo Identity Verification [2022 Guide]

Megusta

Megusta

Related Posts

5 Best Software to Stream Games

5 Best Software to Stream Games

2 Tháng Một, 2023
Top 10 CRM Software For Construction 

Top 10 CRM Software For Construction Enterprises All The Time

31 Tháng Mười Hai, 2022
Instruction how to use OBS streaming software

Features, settings and how to use OBS streaming software through 9 simple steps

25 Tháng Mười Hai, 2022
What is Trans woman?  What is Transgender Women?

What is Trans woman? What is Transgender Women?

23 Tháng Mười Hai, 2022
Christmas gift: Genuine Windows 10 Pro for only $6.63 and Office 2021 for $14.22

Christmas gift: Genuine Windows 10 Pro for only $6.63 and Office 2021 for $14.22

22 Tháng Mười Hai, 2022
How to get 50 free coins of SkyJoy App to redeem

How to get 50 free coins of SkyJoy App to redeem

21 Tháng Mười Hai, 2022
Load More
Next Post
How to Do Venmo Identity Verification [2022 Guide]

How to Do Venmo Identity Verification [2022 Guide]

Trả lời Hủy

Email của bạn sẽ không được hiển thị công khai. Các trường bắt buộc được đánh dấu *

Bài viết mới

How to get travel insurance
Đời sống

Guide on how to get travel insurance with 4 options

24 Tháng Một, 2023
Software Asset Management for Websites: How to Keep Your Sites Running Smoothly
Phần mềm

Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

8 Tháng Một, 2023
5 Best Software to Stream Games
Software

5 Best Software to Stream Games

2 Tháng Một, 2023
IBM Bridge To Cloud For Power
Software

IBM Bridge To Cloud For Power- Everything You Should Know

2 Tháng Một, 2023
Top 10 CRM Software For Construction 
Tech

Top 10 CRM Software For Construction Enterprises All The Time

31 Tháng Mười Hai, 2022
What Is IBM Software
Software

What Is IBM Software? 4 Business Segments at IBM You Should Know

26 Tháng Mười Hai, 2022
W3Schools

Ads

Contact: [email protected]

DMCA.com Protection Status

Categories

  • Android
  • Cạm bẫy tâm lí
  • Chưa được phân loại
  • Đồ họa
  • Đời sống
  • Gen Z
  • Health
  • iOS
  • Kĩ năng mềm
  • News
  • Nhà mạng
  • Phần mềm
  • Phần mềm đồ họa
  • Review sách
  • Software
  • Tech
  • Thiết kế ảnh
  • Thiết kế video
  • Thủ thuật
  • Travel
  • Văn hóa Nam Bộ
  • Văn học
  • Window

Browse by Tag

ai là triệu phú android Apple browser Bullet Journal bản thân chai pin Chỉnh ảnh data domain download fshare game game show giả lập màu hosting IKEA ios khuyến mãi kinh doanh kiến thức kiểm tra pin messenger miễn phí mua sắm Máy ảnh mạng network nghệ thuật ngôn ngữ nhà Trần pin laptop quảng cáo tiếng anh trạng thái Trần Thủ Độ tên miền tắt hoạt động từ vựng video viettel window 10 word zalo Đơn giản

Recent News

How to get travel insurance

Guide on how to get travel insurance with 4 options

24 Tháng Một, 2023
Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

8 Tháng Một, 2023

Trang tin nóng hổi - vừa thổi vừa xem

No Result
View All Result
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z

Trang tin nóng hổi - vừa thổi vừa xem