KamiKakaBot Malware Utilized in Newest Darkish Pink APT Assaults on Southeast Asian Targets | Impulse Tech

not fairly KamiKakaBot Malware Utilized in Newest Darkish Pink APT Assaults on Southeast Asian Targets will cowl the most recent and most present opinion roughly the world. admission slowly fittingly you comprehend capably and accurately. will layer your data expertly and reliably

March 13, 2023ravie lakshmananCyber ​​assault/malware

Malware KamiKakaBot

He darkish Rose The superior persistent menace (APT) actor has been linked to a brand new set of assaults concentrating on authorities and army entities in Southeast Asian international locations with malware known as KamiKakaBot.

Darkish Pink, additionally known as Saaiwc, was first profiled by Group-IB earlier this 12 months, describing its use of customized instruments like TelePowerBot and KamiKakaBot to execute arbitrary instructions and leak delicate info.

The menace actor is suspected to be of Asia-Pacific origin and has been energetic since not less than mid-2021, with a rise in tempo noticed in 2022.

“The newest assaults, which came about in February 2023, had been nearly similar to earlier assaults,” Dutch cybersecurity agency EclecticIQ revealed in a brand new report printed final week.

“The primary distinction within the February marketing campaign is that the malware obfuscation routine has been improved to raised evade anti-malware measures.”

The assaults take the type of social engineering lures that comprise ISO picture attachments in e-mail messages to ship the malware.

The ISO picture contains an executable (Winword.exe), loader (MSVCR100.dll) and a decoy Microsoft Phrase doc, the latter of which comes bundled with the KamiKakaBot payload.

Malware KamiKakaBot

The loader, in the meantime, is designed to load the KamiKakaBot malware by making the most of the DLL’s sideloading technique to evade safety protections and cargo it into the reminiscence of the Winword.exe binary.

KamiKakaBot is primarily designed to steal knowledge saved in internet browsers and execute distant code by way of command immediate (cmd.exe), whereas adopting evasion strategies to mix in with victims’ environments and make detection harder.


Uncover the hidden risks of third-party SaaS functions

Are you conscious of the dangers related to third-party utility entry to your organization’s SaaS functions? Be a part of our webinar to study in regards to the sorts of permits which might be issued and how you can reduce danger.


Persistence on the compromised host is achieved by abusing the Winlogon Helper library to make malicious modifications to Home windows Registry keys. The collected knowledge is later extracted to a Telegram bot as a ZIP file.

“Utilizing professional internet providers as a command and management (C2) server, reminiscent of Telegram, stays the primary alternative for various menace actors, starting from common cybercriminals to superior persistent menace actors,” the corporate mentioned with headquarters in Amsterdam. saying.

“The Darkish Pink APT group is probably a cyber espionage-motivated menace actor particularly exploiting relations between ASEAN and European nations to create phishing lures in the course of the February 2023 marketing campaign.”

Did you discover this text attention-grabbing? observe us Twitter and LinkedIn to learn extra unique content material we publish.

I want the article practically KamiKakaBot Malware Utilized in Newest Darkish Pink APT Assaults on Southeast Asian Targets provides notion to you and is beneficial for complement to your data

KamiKakaBot Malware Used in Latest Dark Pink APT Attacks on Southeast Asian Targets