• Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Press Release
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – STOP/DJVU Ransomware – Active IOCs
September 5, 2022
Rewterz Threat Advisory – Multiple Apache IoTDB Vulnerabilities
September 6, 2022

Rewterz Threat Alert – Donot APT Group – Active IOCs

September 5, 2022

Severity

High

Analysis Summary

Donot APT group has been actively dropping malicious samples and targeting Government users to exfiltrate data. The hackers’ targets include countries in South Asia, in particular, the state sector of Pakistan. The group has a history of attacking Pakistani government officials and military personnel and has been linked to India. 

They previously targeted Pakistani users with android malware named (StealJob) which was used to target Pakistani android mobile users by Phishing on the name of “Kashmiri Voice” The attackers hunt for confidential information and intellectual property. The hackers’ targets include countries in South Asia, in particular, the state sector of Pakistan.

Also, in the previous month (July, 2022), the threat actor of this APT group used Comodo’s certificate to sign its spyware.

Most recently, this APT gang has incorporated new modules to its Windows spyware framework known as YTY, Jaca. These most recent samples appear to be in use in the wild. The newly added modules include a browser stealer component and a shellcode loader component that examines a fresh reverse shell DLL variation, according to researchers.

The browser stealer component has the ability to steal data from Google Chrome and Mozilla Firefox, including login passwords and browsing history.

In the most recent spear-phishing email attack, the group was discovered employing RTF documents and targeting government departments. When these RTF documents are opened, they send an HTTP GET call to the C2 server, which retrieves a malicious remote template.

The victim is tricked into enabling malicious macros that are then exploited to inject a reverse shell module when a remote template is inserted.

It is recommended to use technologies like network firewalls, EDR, and XDR to detect abnormalities at the entry stage since the group focuses on crucial security gaps that only a few firms may have plugged in.

Latest campaign:

Image

Impact

  • Information Theft and Espionage

Indicators of Compromise

MD5

  • 38cbc1515da38e36a73f624db7312686
  • 4e65212344c575bdca1ca9320c2cb25d

SHA-256

  • 4358d185f7c485bf2181c5e2a7b99ec7a457c11d5c1c10ea8ef5ce6f8ddf0dbb
  • 6497540dfff17206d09113166a75586dd9f420380ca652e969752672c805aebb

SHA-1

  • ffe3fb2de72c70a77cd60412d4022789f4a5c70d
  • 7dac0789270895d4f697f19a9c85924915990a32

Remediation

  • Block all threat indicators at your respective controls.
  • Search for IOCs in your environment.
  • Enable antivirus and anti-malware software and update signature definitions in a timely manner. Using a multi-layered protection is necessary to secure vulnerable assets
  • Use technologies like network firewalls, EDR, and XDR to detect abnormalities at the entry stage
  • Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.