Area Pirates Targets Russian IT Companies With New LuckyStrike Agent Malware

0
14
Area Pirates Targets Russian IT Companies With New LuckyStrike Agent Malware


Feb 27, 2025Ravie LakshmananMalware / Community Safety

Area Pirates Targets Russian IT Companies With New LuckyStrike Agent Malware

The menace actor generally known as Area Pirates has been linked to a malicious marketing campaign concentrating on Russian info know-how (IT) organizations with a beforehand undocumented malware referred to as LuckyStrike Agent.

The exercise was detected in November 2024 by Photo voltaic, the cybersecurity arm of Russian state-owned telecom firm Rostelecom. It is monitoring the exercise below the identify Erudite Mogwai.

The assaults are additionally characterised by way of different instruments like Deed RAT, additionally referred to as ShadowPad Mild, and a custom-made model of proxy utility named Stowaway, which has been beforehand utilized by different China-linked hacking teams.

Cybersecurity

“Erudite Mogwai is without doubt one of the energetic APT teams specializing within the theft of confidential info and espionage,” Photo voltaic researchers stated. “Since a minimum of 2017, the group has been attacking authorities companies, IT departments of assorted organizations, in addition to enterprises associated to high-tech industries equivalent to aerospace and electrical energy.”

The menace actor was first publicly documented by Optimistic Applied sciences in 2022, detailing its unique use of the Deed RAT malware. The group is believed to share tactical overlaps with one other hacking group referred to as Webworm. It is recognized to focus on organizations in Russia, Georgia, and Mongolia.

In one of many assaults concentrating on a authorities sector buyer, Photo voltaic stated it found the attacker deploying varied instruments to facilitate reconnaissance, whereas additionally dropping LuckyStrike Agent, a multi-functional .NET backdoor that makes use of Microsoft OneDrive for command-and-control (C2).

“The attackers gained entry to the infrastructure by compromising a publicly accessible internet service no later than March 2023, after which started in search of ‘low-hanging fruit’ within the infrastructure,” Photo voltaic stated. “Over the course of 19 months, the attackers slowly unfold throughout the shopper’s programs till they reached the community segments linked to monitoring in November 2024.”

Cybersecurity

Additionally noteworthy is using a modified model of Stowaway to retain solely its proxy performance, alongside utilizing LZ4 as a compression algorithm, incorporating XXTEA as an encryption algorithm, and including assist for the QUIC transport protocol.

“Erudite Mogwai started their journey in modifying this utility by chopping down the performance they did not want,” Photo voltaic stated. “They continued with minor edits, equivalent to renaming features and altering the sizes of buildings (in all probability to knock down current detection signatures). In the intervening time, the model of Stowaway utilized by this group could be referred to as a full-fledged fork.”

Discovered this text fascinating? Comply with us on Twitter and LinkedIn to learn extra unique content material we put up.



LEAVE A REPLY

Please enter your comment!
Please enter your name here