AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Deadglyph malware: government espionage in the Middle East

High modular flexibility and powerful data collection capabilities: the in-depth analysis of the Deadglyph malware

A sophisticated new malware, called Deadglyph, has been discovered in a cyber espionage attack against a government agency. It was attributed to the Stealth Falcon hacker group, serving the government of the United Arab Emirates. The malware is modular and can download new components from the control server. It collects system information and creates malicious processes.

This pill is also available in Italian language

A new, highly sophisticated backdoor malware, known as Deadglyph, has been identified in a cyber espionage campaign against a Middle Eastern government agency. This malware is attributed to the Advanced Persistent Threat (APT) group Stealth Falcon, also known as Project Raven or FruityArmor, which operates on behalf of the United Arab Emirates (UAE) government.

Deadglyph attack details

ESET experts have no information on the initial infection vector, but suspect the use of a malicious executable, probably a program installer. However, ESET managed to obtain most of the components involved in the infection chain, highlighting their functioning and attempts to evade detection.

A modular malware

Deadglyph features a modular structure, which allows it to download new modules from the command and control (C2) server. These modules contain several shellcodes that are executed by the Executor component. This modular approach gives threat actors the flexibility to create new modules tailored for specific purposes and send them to compromised systems to carry out further malicious actions.

Ability to gather information and create processes

The information collection module uses Windows Management Instrumentation (WMI) queries to collect a wide range of data about the compromised system, including details about the operating system, network adapters, installed software, drives, services, processes, users, environment variables, security software and more. The process creator serves as a tool for running specified commands as new processes. The results are then communicated to the Orchestrator.

Follow us on Telegram for more pills like this

09/25/2023 11:49

Editorial AI

Last pills

Cyber attack in Indonesia: the new Brain Cipher ransomware brings services to their kneesNew ransomware hits Indonesia: learn how Brain Cipher crippled essential services and the techniques used by hackers

Patelco Credit Union: security incident halts customer services in CaliforniaService disruption and customer frustration: Patelco Credit Union works to resolve security incident

Cyber attack on TeamViewer: immediate response and investigations underwayStrengthened security measures and international collaborations to counter the cyber threat

Polyfill JS supply chain attack: what happenedA detailed analysis of the cyber attack that compromised a library essential for JavaScript compatibility in browsers