A brand new menace actor often called AtlasCross has been noticed leveraging Pink Cross-themed phishing lures to ship two beforehand undocumented backdoors named DangerAds and AtlasAgent.
NSFOCUS Safety Labs described the adversary as having a “excessive technical stage and cautious assault perspective,” including that “the phishing assault exercise captured this time is a part of the attacker’s focused strike on particular targets and is its predominant means to attain in-domain penetration.”
The assault chains begin with a macro-laced Microsoft doc that purports to be a few blood donation drive from the American Pink Cross that, when launched, runs the malicious macro to arrange persistence, exfiltrate system metadata to a distant server (information.vectorse[.]com) that is a sub-domain of a legit web site belonging to a structural and engineering agency primarily based within the U.S.
Combat AI with AI — Battling Cyber Threats with Subsequent-Gen AI Instruments
Able to sort out new AI-driven cybersecurity challenges? Be a part of our insightful webinar with Zscaler to deal with the rising menace of generative AI in cybersecurity.
It additionally extracts a file named KB4495667.pkg (codenamed DangerAds), which, subsequently acts as a loader to launch shellcode that results in the deployment of AtlasAgent, a C++ malware able to gathering system info, shellcode operation, and working instructions to acquire a reverse shell in addition to inject code right into a thread within the specified course of.
Each AtlasAgent and DangerAds incorporate evasive options to make it much less prone to be found by safety instruments.
AtlasCross is suspected to have breached public community hosts by exploiting recognized safety vulnerabilities and turning them into command-and-control (C2) servers. NSFOCUS mentioned it recognized 12 completely different compromised servers within the U.S.
The true identification of AtlasCross and its backers presently stays a puzzle.
“At this present stage, AtlasCross has a comparatively restricted scope of exercise, primarily specializing in focused assaults in opposition to particular hosts inside a community area,” the corporate mentioned. “Nevertheless, the assault processes they make use of are extremely sturdy and mature.”
