Skip to main content

Posts

Featured

Threat Update: China-Sponsored Lancefly Cyberespionage, Papercut Server Active Exploitation, ‘Greatness’ Phishing-as-a-Service Tool

Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors Background: Symantec researchers detected a new cyberespionage campaign by the Lancefly China-sponsored group targeting organizations in South and Southeast Asia. From mid-2022 into 2023 the group has targeted the aviation, government, education, and telecom sectors. Indications of intrusion vectors show that Lancefly has possibly moved from phishing attacks to SSH brute force and exploiting publicly accessible devices such as load balancers. A small number of machines were infected in a highly-targeted fashion to deploy the custom Merdoor backdoor and a modification of the open-source ZXShell rootkit. Lancefly abuses a number of legitimate binaries for DLL side-loading, credential stealing, and other living-off-the-land (LOLBin) activities. Takeaway: Organizations are advised to monitor for suspicious SMB activity and LOLBin activities indicating a possible process injection or LSASS m

Latest posts

Threat Update: KEKW Malware, FluHorse Android Assault, Fleckpe Trojans on Google Play

Patch Tuesday Review – May 2023

Automate Based on Business Context with Prism’s Powerful Automation Centre

Prism Platform’s Top Active Exploits – May 2023

Prism’s Automation Centre Will Ensure You Never Miss a Critical Issue Again

Threat Update: 3CX Software Compromise, Decoy Dog Malware Toolkit, EvilExtractor Commodity Infostealer

Threat Update: QBot Banking Trojan, Cozy Bear Russian Espionage, RTM Ransomware as a Service, and more