Monday, March 8, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

PoetRAT Trojan targets energy sector using coronavirus lures

April 19, 2020
in Internet Security
PoetRAT Trojan targets energy sector using coronavirus lures
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

Government and energy sectors are being targeted in a new campaign that weaponizes the coronavirus outbreak. 

On Thursday, Cisco Talos researchers Warren Mercer, Paul Rascagneres and Vitor Ventura published an analysis of a new campaign that deploys PoetRAT, a previously-undiscovered Remote Access Trojan (RAT) striking both the Azerbaijan government and utility companies. 

You might also like

eSafety defends detail of Online Safety Bill as the ‘sausage that’s being made’

Maza Russian cybercriminal forum suffers data breach

Okta and Auth0: A $6.5 billion bet that identity will warrant its own cloud

According to the team, the malware attacks supervisory control and data acquisition (SCADA) systems, commonly used to manage energy networks and manufacturing systems. 

In this case, ICS and SCADA systems relating to wine turbines within the renewable energy sector appear to be of interest to the threat actors behind the campaign, of which their identities are currently unknown. 

Talos says that intended victims receive phishing emails with malicious Microsoft Word documents attached. Three separate phishing attempts have been spotted, including a document labeled “C19.docx,” likely a reference to the COVID-19 pandemic; as well as content claiming to be from departments from the Azerbaijan government and India’s Ministry of Defense. 

“We believe the adversaries, in this case, want to target citizens of the country Azerbaijan, including private companies in the SCADA sector like wind turbine systems,” the researchers say.

If opened, a dropper executes through the enabling of malicious macros to deploy PoetRAT — named so due to references in the code to playwright William Shakespeare. 

See also: This Trojan hijacks your smartphone to send offensive text messages

Rather than being loaded directly as an executable, the malware is written to disk as an archive named “smile.zip.” The .zip file contains a Python script and interpreter and the Word macro will check for a sandbox environment — making the assumption that sandbox hard drives will be smaller than 62GB — before extraction. If a sandbox environment is detected, the malware is overwritten and deleted. 

Written in Python, the Trojan is made up of two main scripts. The first, “frown.py,” is used to communicate with the malware’s command-and-control (C2) server. TLS encryption is used to send information from an infected machine to the Trojan’s operators. 

The second script, “smile.py,” executes a range of other commands, such as directory listing, exfiltrating PC information, taking screenshots, copying, moving, and archiving content, uploading stolen files, and killing, clearing, or terminating processes. It is also possible for PoetRAT to seize control of webcams and steal passwords.

CNET: Investing and saving during coronavirus: Here’s what to prioritize

An interesting tool noticed by the researchers is dog.exe, a .NET malware module that monitors hard drive paths and automatically exfiltrates data via either an email account or FTP.

To maintain persistence, the malware creates registry keys and may make modifications to the registry itself to bypass sandbox evasion checks. 

“This could be used for hosts already infected to ensure they do not re-check this environment,” Talos says. 

TechRepublic: Coronavirus: What business pros need to know

In addition to the main Trojan attack wave, the team also found a phishing website hosted on the same infrastructure that mimics the webmail system of the Azerbaijan government.

“The actor monitored specific directories, signaling they wanted to exfiltrate certain information on the victims,” Talos says. “Based on our research, the adversaries may have wanted to obtain important credentials from officials in Azerbaijan’s government. The attacker wanted not only specific information obtained from the victims but also a full cache of information relating to their victim.”

Previous and related coverage


Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0


Credit: Zdnet

Previous Post

QuickBooks is still the gold standard for small business accounting. Learn how it’s done now.

Next Post

Create Symbiotic Relationships with AI in Business

Related Posts

Bill establishing cyber abuse takedown scheme for adults enters Parliament
Internet Security

eSafety defends detail of Online Safety Bill as the ‘sausage that’s being made’

March 8, 2021
Maza Russian cybercriminal forum suffers data breach
Internet Security

Maza Russian cybercriminal forum suffers data breach

March 7, 2021
Okta and Auth0: A $6.5 billion bet that identity will warrant its own cloud
Internet Security

Okta and Auth0: A $6.5 billion bet that identity will warrant its own cloud

March 7, 2021
CISA issues emergency directive to agencies: Deal with Microsoft Exchange zero-days now
Internet Security

CISA issues emergency directive to agencies: Deal with Microsoft Exchange zero-days now

March 7, 2021
Linux distributions: All the talent and hard work that goes into building a good one
Internet Security

Linux distributions: All the talent and hard work that goes into building a good one

March 7, 2021
Next Post
Create Symbiotic Relationships with AI in Business

Create Symbiotic Relationships with AI in Business

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

Top 6 Regression Techniques a Data Science Specialist Needs to Know
Data Science

Top 6 Regression Techniques a Data Science Specialist Needs to Know

March 8, 2021
Dataiku named as Gartner Leader for Data Science and Machine Learning
Machine Learning

Dataiku named as Gartner Leader for Data Science and Machine Learning

March 8, 2021
Bill establishing cyber abuse takedown scheme for adults enters Parliament
Internet Security

eSafety defends detail of Online Safety Bill as the ‘sausage that’s being made’

March 8, 2021
An Easy Way to Solve Complex Optimization Problems in Machine Learning
Data Science

An Easy Way to Solve Complex Optimization Problems in Machine Learning

March 8, 2021
Machine Learning Patentability In 2019: 5 Cases Analyzed And Lessons Learned Part 4 – Intellectual Property
Machine Learning

Podcast: Non-Binding Guidance: FDA Regulatory Developments In AI And Machine Learning – Food, Drugs, Healthcare, Life Sciences

March 8, 2021
Here’s an adorable factory game about machine learning and cats
Machine Learning

Here’s an adorable factory game about machine learning and cats

March 8, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • Top 6 Regression Techniques a Data Science Specialist Needs to Know March 8, 2021
  • Dataiku named as Gartner Leader for Data Science and Machine Learning March 8, 2021
  • eSafety defends detail of Online Safety Bill as the ‘sausage that’s being made’ March 8, 2021
  • An Easy Way to Solve Complex Optimization Problems in Machine Learning March 8, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates