Daffodil International University

Faculty of Science and Information Technology => Recent Technologies and Trends in Software Engineering => Software Engineering => Cyber and Software Security => Topic started by: maruf.swe on February 26, 2020, 01:06:06 AM

Title: U.S. Gov Agency Targeted With Malware-Laced Emails
Post by: maruf.swe on February 26, 2020, 01:06:06 AM
(https://media.threatpost.com/wp-content/uploads/sites/103/2020/01/23124846/spear-phishing-.jpg)



The malicious email campaign included a never-before-seen malware downloader called Carrotball, and may be linked to the Konni Group APT.

A U.S. government agency was targeted with spear phishing emails harboring several malware strains – including a never-before-seen malware downloader that researchers call “Carrotball.”

The campaign, which researchers observed occurring from July to October and code-named “Fractured Statue,” involved six unique malicious document lures being sent as attachments from four different Russian email addresses to 10 unique targets. The subject matter of the lures featured articles written in Russian pertaining to ongoing geopolitical relations issues surrounding North Korea.

“Overall, the Fractured Statue campaign provides clear evidence that the TTPs [tactics, techniques and procedures] discovered in Fractured Block are still relevant, and that the group behind the attacks still appears to be active,” said Adrian McCabe with Palo Alto Networks’ Unit 42 research group

For More Details : https://threatpost.com/u-s-gov-agency-malware-laced-emails/152141/ (https://threatpost.com/u-s-gov-agency-malware-laced-emails/152141/)
Title: Re: U.S. Gov Agency Targeted With Malware-Laced Emails
Post by: moyez on February 27, 2020, 08:41:55 PM
Nice Post.