Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Hackers use leaked shelter tool licenses to spread Lumma Stealer and Sectoprat malware

Anatsa Android Banking Trojan hits 90,000 users with fake PDF apps on Google Play

The latest update for Mastodon prepares quote posts, Revamps Design app

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Cybercriminals are leveraging open source tools to compromise on financial institutions in Africa
Identity

Cybercriminals are leveraging open source tools to compromise on financial institutions in Africa

userBy userJune 26, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 26, 2025Ravi LakshmananThreat Intelligence/Ransomware

Cybersecurity researchers have been bringing attention to a series of cyberattacks targeting African financial organizations since at least July 2023, using a combination of open source and public tools to maintain access.

Palo Alto Networks Unit 42 refers to “Cl” to “Cluster”, and “CRI” to “Crimer Votivation” and “Cl” to “CL” and “CRI”.

The ultimate goal of the attack is suspected to be to obtain initial access and sell it to other criminals at underground forums, and make threat actors an initial access broker (IAB).

“Threat actors copy signatures from legal applications to forge file signatures, disguise toolsets, and mask malicious activities,” said researchers Tom Factorman and Guy Levy. “Threat actors often spread legitimate products for malicious purposes.”

Cybersecurity

The attack is characterized by the deployment of tools such as POSHC2 for Command and Control (C2), chisels for tunnels of malicious network traffic, and classroom spys for remote management.

The exact method used by threat threats to violate the target network is not clear. Once scaffolding is obtained, the attack chain deploys Mesh Central Agent and subsequent classroom spies to command the machine, bypassing POSHC2 to other Windows hosts on the compromised network, and bypassing and spreading POSHC2.

For side step detection efforts, payloads are passed as legitimate software using icons from Microsoft Teams, Palo Alto Networks Cortex and Broadcom VMware Tools. POSHC2 lasts in the system using three different methods –

Setting up a service to save Windows Shortcuts (LNK) files to a tool in the startup folder using a task scheduled with the name “Palo Alto Cortex Services.”

In some incidents observed by cybersecurity companies, the threat actor is said to have stolen user credentials and is used to set up a proxy using POSHC2.

“POSHC2 can use a proxy to communicate with command and control (C2) servers, and the threat actor appears to have tailored some of the POSHC2 implants specifically for the target environment,” the researchers say.

This is not the first time POSHC2 has been used in an attack targeting Afrance Services. In September 2022, Checkpoint detailed a spear phishing campaign called DangerseSavanna to provide Metasploit, POSHC2, DWSERVICE and ASYNCRAT, targeting financial and insurance companies in the Ivory Coast, Morocco, Cameroon, Senegal and Togo.

Cybersecurity

The disclosure has shed light on a new ransomware group called DiRe Wolf, which has already claimed 16 casualties throughout the US, Thailand, Taiwan, Australia, Australia, Bahrain, Canada, India, Italy, Peru and Singapore since its arrival last month. The top target sectors are technology, manufacturing and financial services.

An analysis of Dire Wolf Locker reveals what is written in Golang, with the ability to disable system logging, terminate the hard coding list for 75 services and 59 applications, and remove Shadow Copies to block recovery efforts.

“While there is no initial access, the reconnaissance or lateral movement techniques used by Dire Wolf are known at this time, but organizations will follow appropriate security practices to allow monitoring of the technologies revealed in this analysis,” the company said.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBehind the new era of space exploration
Next Article What is working to reduce methane emissions in agriculture?
user
  • Website

Related Posts

Hackers use leaked shelter tool licenses to spread Lumma Stealer and Sectoprat malware

July 8, 2025

Anatsa Android Banking Trojan hits 90,000 users with fake PDF apps on Google Play

July 8, 2025

Malicious Pull Request Targets Over 6,000 Developers Target via Vulnerable Escode vs Code Extensions

July 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Hackers use leaked shelter tool licenses to spread Lumma Stealer and Sectoprat malware

Anatsa Android Banking Trojan hits 90,000 users with fake PDF apps on Google Play

The latest update for Mastodon prepares quote posts, Revamps Design app

Moonvalley’s “ethical” AI video model for filmmakers has been released

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.