Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Flash flood evacuation at an elementary school in western Maryland

Lead the Digital Revolution: Secure Exclusive TwinH Country Distribution Licenses

Mali will disband all political parties after opposition says that opposition has been “arrested” | Political News

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Kaspersky links headmare to 12 and targets Russian entities via shared C2 server
Identity

Kaspersky links headmare to 12 and targets Russian entities via shared C2 server

userBy userMarch 21, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 21, 2025Ravi LakshmananMalware/Cyber ​​Attacks

Kaspersky’s new findings say that two known threat activity cluster code name head Mare and 12 people are likely to join forces to target Russian entities.

“Headmare previously relied heavily on tools associated with 12. Furthermore, the Headmare attacks utilized a command and control (C2) server linked to 12 before these incidents,” the company said. “This suggests potential collaboration and joint campaigns between the two groups.”

Both Headmare and the 12 people had previously been recorded by Kaspersky in September 2024. The former was taking advantage of a vulnerability currently patched in Winrar (CVE-2023-38831) to obtain initial access, provide malware, and in some cases deploy a ransomware family for the Lands.

Meanwhile, the 12 are observed by staging destructive attacks, utilizing a variety of publicly available tools to encrypt victim data, irreparably destroy infrastructure with wipers, preventing recovery efforts.

Cybersecurity

According to Kaspersky’s latest analysis, Head Mare uses two new tools, including a backdoor used by Excobalt and Crypt Ghouls in attacks targeting Russian companies in the past, and an implant named Phantomjitter, which was installed on a server to execute remote commands.

The Covint development has also been observed in the attacks of 12 people where overlaps were discovered between the hacking crew and the cryptoghoul, indicating some tactical connection between different groups currently targeting Russia.

Other initial access routes that Headmail uses include abuse of other known security flaws in Microsoft Exchange Server (e.g. CVE-2021-26855, also known as Proxylogon) and breaching the network of contractors that breach the victim’s infrastructure by breaching the fraudulent attachments and the network of contractors.

“Attackers use Proxylogon to run commands to download and launch Cobint on the server,” Kaspersky said, highlighting the use of an updated persistence mechanism that avoids scheduled tasks in favor of creating new privileged local users on the Business Automation Platform server. Use these accounts to connect to the server via RDP to interactively transfer and run the tools.

In addition to assigning malicious payload names that mimic benign operating system files (for example, calc.exe or winuac.exe), it is known that threat actors clear the event log and remove traces of activity by using proxy and tunneling tools such as GOST and CloudFlared to hide network traffic.

Some of the other utilities used are

Data Transfer Register RDP to register RDP RDP RDP for Credentials RDP for RDP RDP for Collection of Active Directory Mimikatz, SecretSdump, and Procdump information for QUSER.EXE, TASKLIST.EXE, and NETSTAT.EXE System Recon FSCAN and SOFTPERT Network Scanner

The attack culminates in the deployment of Lockbit 3.0 and Babuk ransomware on the compromised host, then deletes a note that encourages the victim to contact them via Telegram to decrypt the file.

“Headmare is actively expanding its set of techniques and tools,” Kaspersky said. “The recent attacks have gained early access to target infrastructure by breaching contractors as well as using phishing emails with exploits. Headmare is working with 12 to launch an attack on Russian states and private companies.”

Cybersecurity

The development provided Bi.zone linked North Korea-related threat actors known as Scarcruft (aka Apt37, Ricochet Chollima, and Squid Werewolf) to their phishing campaign in December 2024, providing a malware loader that deploys unknown payloads from remote servers.

The activity is very similar to another campaign called Shrouded Steek, documented by SecuroNix in October 2024, which it says will lead to the deployment of backdoors called veilshells in invasions targeting Cambodia and possibly other Southeast Asian countries.

Last month, Bi.Zone also detailed the ongoing cyberattacks staged by Bloody Wolf, offering Netsupport Rat as part of a campaign that compromised Kazakhstan and more than 400 Russian systems, indicating its transition from Strrat.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleLigo, Virgo and Kagra detect the 200th signal
Next Article Pakistan stuns New Zealand as the record-breaking Nawaz Century Blows Open T20i series | Cricket News
user
  • Website

Related Posts

Lead the Digital Revolution: Secure Exclusive TwinH Country Distribution Licenses

May 13, 2025

China Link APTS Exploit SAP CVE-2025-31324 581 Critical Systems Around the World

May 13, 2025

Malicious peepy package stealing source code that stole Solana Tools with 761 download

May 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Flash flood evacuation at an elementary school in western Maryland

Lead the Digital Revolution: Secure Exclusive TwinH Country Distribution Licenses

Mali will disband all political parties after opposition says that opposition has been “arrested” | Political News

Can Your Digital Twin Make You Money? Discover the LEHT Opportunity

Trending Posts

Mali will disband all political parties after opposition says that opposition has been “arrested” | Political News

May 13, 2025

Iraq will release more than 19,000 prisoners under a new pardon. ISIL/ISIS News

May 13, 2025

Albanian dominant socialists secure a majority in parliamentary votes | Election news

May 13, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Lead the Digital Revolution: Secure Exclusive TwinH Country Distribution Licenses

Can Your Digital Twin Make You Money? Discover the LEHT Opportunity

Microsoft is chasing thousands of employees despite quarterly profits of $25.8 billion. The biggest layoff since 2023

Madrid-based startup shaker lands 14 million euros to expand its AI-driven platform for high-tech freelancers in Europe

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.