banner Expire 1 July 2024
Ad Ends 13 July 2024
banner Expire 15 July 2024
banner Expire 18 October 2024
ad End 18 October 2024
Ad Ends 13 July 2023
banner Expire 20 May 2024
What's new
Ad expire at 5 May 2024
UniCvv
CrdCrew.cc Carding forum
Western union transfer
Carding.pw carding forum
adv exp at 23 may

ESCO

TRUSTED VERIFIED SELLER
Staff member
Joined
Jun 28, 2020
Messages
6,308
Reaction score
710
Points
212
Awards
2
  • Somebody Likes you
  • First post
Attackers use a tool designed to infect USB devices in their attacks.







The Transparent Tribe cybercriminal group (also known as PROJECTM and MYTHIC LEOPARD) has launched malicious campaigns against diplomats and military personnel in 27 countries. Most of the victims were located in Afghanistan, Pakistan, India, Iran and Germany. Attackers armed themselves with a new tool designed to infect USB devices and spread malware to other systems.

The attack chain begins with targeted phishing. Fraudulent messages are sent with malicious Microsoft Office documents containing an embedded macro to install the Crimson Remote Access Trojan. The Trojan is capable of many functions, including connecting to a C&C server to steal data, update malware remotely, take screenshots, and hack microphones and webcams for audio and video surveillance.

According to experts from Kaspersky Lab, the malware is capable of stealing files from removable media, performing keylogging and stealing credentials from browsers.

The Transparent Tribe also uses malware such as .NET-based Crimson and Python-based Peppy. In recent attacks, criminals have incorporated a new functionality into the Crimson Trojan called USBWorm. It consists of two main components: a tool to steal files from removable drives and a worm function to infect other vulnerable devices.

If a USB drive is connected to the infected PC, a copy of the Trojan is invisibly installed on the removable drive. The malware enumerates all the directories on the disk and then saves a copy of the Trojan in the root directory of the disk. The directory attribute is then changed to "hidden" and the fake Windows icon is used to entice victims to click and execute a payload when trying to access directories.
 
Ad End 1 July 2024
Top