In spear-phishing campaign known as Operation Covert Access, Argentina’s judicial ecosystem was targeted. By leveraging highly convincing court-themed documents, adversaries exploit trust in official communications for initial access. ZIP archives were distributed with weaponized LNK shortcut, a BAT loader, a legitimate-looking PDF. When victim views the decoy document, malicious processes execute silently in the background, deploys a stealthy Rust-based RAT, enabling persistent access to sensitive legal and institutional environments, indicating espionage-driven motive focused on long-term data collection. This begins when the victim opens the disguised LNK file executing PowerShell in hidden mode while bypassing execution policies while decoy PDF is displayed to reduce suspicion. The LNK triggers a BAT script that acts as a loader, initiating PowerShell commands to establish outbound communication with a GitHub-hosted resource. With browser-like User-Agent string, it downloads a payload ‘health-check.exe’, saving as ‘msedge_proxy.exe’ within the Microsoft Edge user data directory. This naming and placement strategy blends as legitimate system files and evade basic detection mechanisms. Once executed, anti-analysis checks are done including detection of virtualization platforms, sandbox environments, debugging tools through registry queries, file existence checks, and process enumeration, also uses timing discrepancies and PEB flags to identify analysis environments and terminate execution if detected. After validation, the malware collects system information and establishes a resilient command-and-control channel with IPv4/IPv6 fallback. It supports modular commands such as persistence, data exfiltration, file transfer, privilege escalation, and encryption. Commands are Base64-encoded, enabling dynamic deployment of additional modules like credential stealers or ransomware components. Organizations should restrict LNK execution, monitor abnormal PowerShell activity, and limit script-based access to external repositories. Enforcing strong endpoint protection, updating security tools, and educating users on phishing risks are critical. Continuous monitoring of system behavior and network connections can help detect anomalies early, reducing the likelihood of successful compromise and persistent attacker presence.
Authorities recently dismantled a massive IoT-based botnet responsible for launching record-breaking distributed denial-of-service (DDoS) attacks reaching up to 30 Tbps. The operat...
Cisco firewall appliances are actively being targeted through critical zero-day vulnerabilities that enable unauthenticated attackers to gain full control over affected systems. Th...
The ransomware group LeakNet is expanding operations by developing its own infection and execution infrastructure, reducing reliance on initial access brokers. key innovation in it...