Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Deadglyph malware: government espionage in the Middle East

High modular flexibility and powerful data collection capabilities: the in-depth analysis of the Deadglyph malware

A sophisticated new malware, called Deadglyph, has been discovered in a cyber espionage attack against a government agency. It was attributed to the Stealth Falcon hacker group, serving the government of the United Arab Emirates. The malware is modular and can download new components from the control server. It collects system information and creates malicious processes.
This pill is also available in Italian language

A new, highly sophisticated backdoor malware, known as Deadglyph, has been identified in a cyber espionage campaign against a Middle Eastern government agency. This malware is attributed to the Advanced Persistent Threat (APT) group Stealth Falcon, also known as Project Raven or FruityArmor, which operates on behalf of the United Arab Emirates (UAE) government.

Deadglyph attack details

ESET experts have no information on the initial infection vector, but suspect the use of a malicious executable, probably a program installer. However, ESET managed to obtain most of the components involved in the infection chain, highlighting their functioning and attempts to evade detection.

A modular malware

Deadglyph features a modular structure, which allows it to download new modules from the command and control (C2) server. These modules contain several shellcodes that are executed by the Executor component. This modular approach gives threat actors the flexibility to create new modules tailored for specific purposes and send them to compromised systems to carry out further malicious actions.

Ability to gather information and create processes

The information collection module uses Windows Management Instrumentation (WMI) queries to collect a wide range of data about the compromised system, including details about the operating system, network adapters, installed software, drives, services, processes, users, environment variables, security software and more. The process creator serves as a tool for running specified commands as new processes. The results are then communicated to the Orchestrator.

Follow us on Facebook for more pills like this

09/25/2023 11:49

Marco Verro

Last pills

Cloudflare repels the most powerful DDoS attack ever recordedAdvanced defense and global collaboration to tackle new challenges of DDoS attacks

Silent threats: the zero-click flaw that compromises RDP serversHidden risks in remote work: how to protect RDP servers from invisible attacks

Discovery of vulnerability in Secure Boot threatens device securityFlaw in the Secure Boot system requires urgent updates to prevent invisible intrusions

North korean cyberattacks and laptop farming: threats to smart workingAdapting to new digital threats of remote work to protect vital data and infrastructures

Don’t miss the most important news
Enable notifications to stay always updated