Recently, the security researchers of Kaspersky Lab have detected a very new cyberattack campaign in Southeast Asia, and the campaign was named as LuminousMoth and it has been conducting such attacks since October 2020.
This campaign is quite different from other popular and advanced targeted attacks. Here, the main point of this campaign that grabs the attention is the number of victims, which is not restricted to dozens of organizations, but many times more extensive.
This campaign was one of the rare among all, and the security experts have claimed that for this reason, they found two infection vectors that were being used by LuminousMoth.
However, the initial vector is the one that provides the threat actors with primary access to a system; and here, the hackers use spear-phishing emails with malicious Dropbox download links.
On the other side, the second infection vector comes into action once the first vector did its work successfully. Soon the malware attempts to spread all over the system by affecting the removable USB drives.
But, the security analysts from Kaspersky stated that the attackers can implement their attacks, with the help of two components, the initial one is a malicious library called “version.dll” which gets sideloaded by “igfxem.exe,” and a Microsoft Silverlight executable which is formerly named “sllauncher.exe.”
There are two exploitation tools mainly used by the threat actors, and they are:-
After the investigation, the security researchers concluded that LuminousMoth has infected a large number of targets, and the targets mainly belong from the Philippines and Myanmar.
But, after investigating the campaign the analysts pronounced that they have found nearly 100 victims in Myanmar, and 1,400 victims in the Philippines. Apart from this, the campaign also attacked victims from government agencies as well.
In command and control communication, the experts discovered that the threat actors have contacted many IP addresses directly, as well as communicating with the domain “updatecatalogs.com.”
While apart from this they also found some other domains as well, and here they are mentioned below:-
After a proper investigation, the cybersecurity researchers came to know that this camping has a lot of similarities with the HoneyMyte threat group. The things that make a connection between LuminiousMoth and HoneyMyte is that both the group has the same targeting and TTP.
Moreover, both the group has the same usage of DLL side-loading and Cobalt Strike loaders, as well as the component to LuminousMoth’s Chrome cookie stealer, was also seen in earlier HoneyMyte activity.
However, the security researchers affirmed that both groups have implemented activity of the same nature, in both cases, a large-scale attack has taken place, which has affected a wide perimeter of targets. But still, it is not clear yet, whether both the groups are connected or not.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.
A novel cryptomining campaign has been identified that exploits misconfigured Jupyter Notebooks, targeting both Windows…
Amazon Web Services Simple Notification Service (AWS SNS) has emerged as a new vector for…
Cybersecurity researchers have discovered that DeepSeek R1, an open-source large language model, can be manipulated…
The rise of remote work has significantly increased the attack surface for cybercriminals, making robust…
A new, surprisingly simple method called Context Compliance Attack (CCA) has proven effective at bypassing…
A Russian-speaking actor using the Telegram handle @ExploitWhispers leaked internal chat logs of Black Basta…