Researchers at security company ESET uncover Crutch, a new malware backdoor. The newly detailed Crutch campaign appears tailored towards particular targets, suggesting a ministry of foreign affairs in an EU country.
This malware is built to steal sensitive documents and other files by secretly copying them from Dropbox accounts controlled by the attackers. This malware campaign has been active from 2015 through to 2020 and researchers have linked it to the Turla hacking group due to similarities with previously uncovered campaigns. The backdoor has repeatedly been updated and changed over the years in order to maintain effectiveness while also keeping it hidden. The attackers were able to move laterally and compromise additional machines by reusing admin passwords.
Check the source.
- FBI: Business Email Compromise – a $43B ScamA new FBI report warns of a staggering spike in hacking activities using the Business Email Compromise technique (BEC), […]
- NVIDIA Confirms Employee Credentials And Proprietary Data Stolen During CyberattackNVIDIA confirmed the Lapsus$ cyberattack and the data leak that followed, saying it first became aware of the security […]
- FoxBlade Trojan Hit Ukraine Right Before The 24 Feb Devastating Russian InvasionMicrosoft discovered an attack using the FoxBlade malware that had compromised Ukrainian systems just hours before Russia’s massive and […]
- Anonymous Group Sides With Ukraine And Declares Cyberwar On RussiaThe hacker collective known as the Anonymous group announced its support to Ukraine. It defied Vladimir Putin by taking […]
- Phishing Attacks Against Those Who Help Ukrainian RefugeesCybercriminals used a compromised military email address to launch phishing attacks targeting EU personnel aiding Ukrainian citizens who had […]