Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Lovable just helped a company bring vibecoding to their hardware

Cerebras IPO brings billions to Benchmark, but VC Eric Vishlier barely attended the meeting

What happens when AI starts building itself?

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Kaspersky links headmare to 12 and targets Russian entities via shared C2 server
Identity

Kaspersky links headmare to 12 and targets Russian entities via shared C2 server

By March 21, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 21, 2025Ravi LakshmananMalware/Cyber ​​Attacks

Kaspersky’s new findings say that two known threat activity cluster code name head Mare and 12 people are likely to join forces to target Russian entities.

“Headmare previously relied heavily on tools associated with 12. Furthermore, the Headmare attacks utilized a command and control (C2) server linked to 12 before these incidents,” the company said. “This suggests potential collaboration and joint campaigns between the two groups.”

Both Headmare and the 12 people had previously been recorded by Kaspersky in September 2024. The former was taking advantage of a vulnerability currently patched in Winrar (CVE-2023-38831) to obtain initial access, provide malware, and in some cases deploy a ransomware family for the Lands.

Meanwhile, the 12 are observed by staging destructive attacks, utilizing a variety of publicly available tools to encrypt victim data, irreparably destroy infrastructure with wipers, preventing recovery efforts.

Cybersecurity

According to Kaspersky’s latest analysis, Head Mare uses two new tools, including a backdoor used by Excobalt and Crypt Ghouls in attacks targeting Russian companies in the past, and an implant named Phantomjitter, which was installed on a server to execute remote commands.

The Covint development has also been observed in the attacks of 12 people where overlaps were discovered between the hacking crew and the cryptoghoul, indicating some tactical connection between different groups currently targeting Russia.

Other initial access routes that Headmail uses include abuse of other known security flaws in Microsoft Exchange Server (e.g. CVE-2021-26855, also known as Proxylogon) and breaching the network of contractors that breach the victim’s infrastructure by breaching the fraudulent attachments and the network of contractors.

“Attackers use Proxylogon to run commands to download and launch Cobint on the server,” Kaspersky said, highlighting the use of an updated persistence mechanism that avoids scheduled tasks in favor of creating new privileged local users on the Business Automation Platform server. Use these accounts to connect to the server via RDP to interactively transfer and run the tools.

In addition to assigning malicious payload names that mimic benign operating system files (for example, calc.exe or winuac.exe), it is known that threat actors clear the event log and remove traces of activity by using proxy and tunneling tools such as GOST and CloudFlared to hide network traffic.

Some of the other utilities used are

Data Transfer Register RDP to register RDP RDP RDP for Credentials RDP for RDP RDP for Collection of Active Directory Mimikatz, SecretSdump, and Procdump information for QUSER.EXE, TASKLIST.EXE, and NETSTAT.EXE System Recon FSCAN and SOFTPERT Network Scanner

The attack culminates in the deployment of Lockbit 3.0 and Babuk ransomware on the compromised host, then deletes a note that encourages the victim to contact them via Telegram to decrypt the file.

“Headmare is actively expanding its set of techniques and tools,” Kaspersky said. “The recent attacks have gained early access to target infrastructure by breaching contractors as well as using phishing emails with exploits. Headmare is working with 12 to launch an attack on Russian states and private companies.”

Cybersecurity

The development provided Bi.zone linked North Korea-related threat actors known as Scarcruft (aka Apt37, Ricochet Chollima, and Squid Werewolf) to their phishing campaign in December 2024, providing a malware loader that deploys unknown payloads from remote servers.

The activity is very similar to another campaign called Shrouded Steek, documented by SecuroNix in October 2024, which it says will lead to the deployment of backdoors called veilshells in invasions targeting Cambodia and possibly other Southeast Asian countries.

Last month, Bi.Zone also detailed the ongoing cyberattacks staged by Bloody Wolf, offering Netsupport Rat as part of a campaign that compromised Kazakhstan and more than 400 Russian systems, indicating its transition from Strrat.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleLigo, Virgo and Kagra detect the 200th signal
Next Article Pakistan stuns New Zealand as the record-breaking Nawaz Century Blows Open T20i series | Cricket News

Related Posts

Cisco Catalyst SD-WAN Controller Authentication Bypass Is Actively Abused to Gain Administrative Access

May 14, 2026

Stealer backdoor targeting developer secrets found in three node IPC versions

May 14, 2026

PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories

May 14, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Lovable just helped a company bring vibecoding to their hardware

Cerebras IPO brings billions to Benchmark, but VC Eric Vishlier barely attended the meeting

What happens when AI starts building itself?

OpenAI is reportedly preparing legal action against Apple. This isn’t the first time my partner has been burned.

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.