Latest News
- Kuwait-Jordan Durra Field Joint Statement Rejected By Iran
- GTD Cracks Down On Vehicle Noise Pollution In Sulaibiya
- Mystery Of Dead Fish At Shuwaikh Beach Sparks Urgent Action
- MEW To Complete Links With The Interior And Justice Ministries B...
- 8 Expats Jailed For Bribing An Officer To Obtain Driver's Licens...
- Weekend Weather Is Expected To Be Hot
- From Tomorrow, Traffic Diversion On Third Ring Road
- Ministry Of Health Refute Rumors On Non-availability Of Antibiot...
- Amir Of Kuwait And Jordan King Renew Commitment To Regional Secu...
- 37 Arrested With Narcotics And Firearms
- Outrage Over Candidate's Arrest
- Six Stores Shut Down In Jahra For Selling Fake Goods
Cyber-security Firms Has Primarily Discover New Hackers
Tracked by cyber-security firms under names such as Lyceum (Secureworks naming) and Hexane (Dragos naming), this new group has primarily focused on the local energy sector, reports Al-Qabas daily quoting www.zdnet.com
In a report published earlier this month, ICS security firm Dragos said that Lyceum (Hexane) had repeatedly targeted oil and gas companies in the Middle East, with “Kuwait as a primary operating region.”
But while the bulk of Lyceum attacks were aimed at companies in the energy sector, the group also targeted telecommunication providers in the greater Middle East, Central Asia, and Africa, Dragos said, “potentially as a stepping stone to network-focused man-inthe- middle and related attacks.”
But setting aside these rare attacks, the bulk of Lyceum’s activity has been focused on companies in the energy sector.
In a report published recently and shared with ZDNet, Secureworks said that it detected a spike in Lyceum activity targeting oil and gas companies in May this year, a spike that came after “a sharp uptick in development and testing of their toolkit against a public multi-vendor malware scanning service in February 2019.”
These attacks followed a simple, yet very effective pattern, Secureworks explained. First, Lyceum members would utilize techniques such as password spraying and brute-force attacks to breach individual email accounts at target organizations.
One successful, in the second stage of these attacks, Lyceum members would use the compromised email accounts to send spear-phishing emails to the victim’s colleagues.
These emails would deliver malicious Excel files that would attempt to infect other users in the same organization with malware. The primary targets of these second-stage spear-phishing campaigns would be executives, HR staff, and IT personnel in the same organization.
The Excel files would contain a payload named DanDrop, a VBA macro script that would infect the victim with DanBot, a C# remote access trojan (RAT).
Lyceum hackers would then use the DanBot RAT to download and run additional malware on the victims’ systems, most of which were PowerShell scripts with passworddumping, later movement, or keylogging functionality.
Both Dragos and Secureworks have abstained from linking the group to any specific country’s cyber-espionage apparatus. Nevertheless, both Dragos and Secureworks have gone on the record and said that the tactics, techniques, and procedures (TTPs) used by Lyceum resemble APT33 and APT34, two cyber-espionage groups that have been historically linked to Iran.
SOURCE : ARABTIMES
Trending News
-
Kuwait Implements Home Biometrics Services Ahead O...
14 April 2024
-
Kuwait Airways Provides Update On Flight Schedule...
14 April 2024
-
Kuwait Airways Introduces Convenient Home Luggage...
15 April 2024
-
Expat Residency Law Amended By Kuwait Ministerial...
20 April 2024
-
Two Expats Are Arrested For Stealing From Salmiya...
17 April 2024
-
Kuwait Airways Resumes Flights To Beirut And Oman...
15 April 2024
-
Temperature Increases Cause Electricity Load Index...
21 April 2024
-
Thief Returns Stolen Money With An Apology Letter...
15 April 2024
-
3 Expats Caught In Salmiya With 213 Bottles Of Loc...
23 April 2024
-
Ministry Of Interior Denies Social Media Rumors Re...
13 April 2024
Comments Post Comment