Casa > cibernético Notícias > MirageFox Malware: A mais recente adição APT15 Corte Arsenal

MirageFox Malware: A mais recente adição APT15 Corte Arsenal

imagem MirageFox

O grupo de hackers APT15 que tornou-se conhecido por seus ataques de alto perfil contra US Militar desenvolveu uma nova ferramenta de malware perigoso chamado MirageFox. Acredita-se que é uma versão atualizada das ameaças lançadas anteriormente. A detailed technical analysis shows that it is capable of inflicting a lot of damage to the target computers.

The MirageFox Malware Is The Latest Weapon Used By the APT15 Hackers

The APT15 hacking group is one of the most well-known criminal organizations that is believed to be affiliated with the Chinese government. Over the years they have been spotted at attacking mainly high-profile government and military targets using sophisticated methods of infection. Other targets include multi-national companies in industries like oil and the like. A signature mechanism that they employ is that they target the installed applications on the workstation computers. Once the network has been breached they will use custom solutions in order to continue the attacks.

The MirageFox malware was discovered by a hybrid signature that appears to hold signatures of previous weapons used by he group. The security analysts note that the new tool is programmed in a way that avoids instant discovery. The detection ratings show that a majority of the security software cannot identify it as a virus signature.

A full analysis is not yet available as the analysts were not able to capture a complete sample of MirageFox’s code. The available snippets showcase how the threat will react once the initial infections are done. However details on how the exact mechanism works are not yet available.

Story relacionado: InvisiMole Spyware: Ferramenta sofisticada para alvejado do Cyber ​​Espionage

MirageFox Malware Capabilities

The partial information that is available for MirageFox shows that it includes several properties allowing it to infect the targets on a deep level. The following infection tactics are confirmed in the captured strains:

  • processar Hookup — The MirageFox can hook itself to either system or user-installed processes and services. This makes it very useful when harvesting sensitive data about the victims and their input data.
  • Conexão do servidor — The MirageFox malware can create a secure connection to a hacker-controlled server. This can be used to report the made infections, as well as spy on the victims in real-time. Using this module the hackers can obtain access to the victim machines. This mechanism is also useful for deploying additional threats to the hosts.
  • Bypass de segurança — The MirageFox malware can be programmed to overcome security software that may interfere with it’s correct execution.

A further inspection over the captured samples shows that the reported hacker-controlled servers are found on internal network servers. This leads the experts to believe that either the virus has been specifically made against the targets or that the connection is being tunnelled through a VPN (rede privada virtual).

We anticipate that further reports about APT15’s operations will be available as the group is known to target companies and agencies using different tactics.


Martin Beltov

Martin formou-se na publicação da Universidade de Sofia. Como a segurança cibernética entusiasta ele gosta de escrever sobre as ameaças mais recentes e mecanismos de invasão.

mais Posts

Me siga:

Deixe um comentário

seu endereço de e-mail não será publicado. Campos obrigatórios são marcados *

Compartilhar no Facebook Compartilhar
Compartilhar no Twitter chilrear
Compartilhar no Google Plus Compartilhar
Partilhar no Linkedin Compartilhar
Compartilhar no Digg Compartilhar
Compartilhar no Reddit Compartilhar
Partilhar no StumbleUpon Compartilhar