Спонсоры
Operation DupeHike : UNG0902 targets Russian employees with DUPERUNNER and AdaptixC2

A cyber-espionage campaign targeting Russian employees uses spear-phishing ZIP archives containing malicious LNK shortcuts to deliver the DUPERUNNER implant and connect with AdaptixC2 for command-and-control. The operation focuses on stealthy access and data exfiltration. Read this blog to explore the technical analysis and attack chain.

Read this blog: https://www.seqrite.com/blog/operation-dupehike-ung0902-targets-russian-employees-with-duperunner-and-adaptixc2/

#cybersecurity #threatintelligence #malwareanalysis #spearphishing #aptactivity
Operation DupeHike : UNG0902 targets Russian employees with DUPERUNNER and AdaptixC2 A cyber-espionage campaign targeting Russian employees uses spear-phishing ZIP archives containing malicious LNK shortcuts to deliver the DUPERUNNER implant and connect with AdaptixC2 for command-and-control. The operation focuses on stealthy access and data exfiltration. Read this blog to explore the technical analysis and attack chain. Read this blog: https://www.seqrite.com/blog/operation-dupehike-ung0902-targets-russian-employees-with-duperunner-and-adaptixc2/ #cybersecurity #threatintelligence #malwareanalysis #spearphishing #aptactivity
WWW.SEQRITE.COM
Operation DupeHike : UNG0902 targets Russian employees with DUPERUNNER and AdaptixC2 | Seqrite
Contents Introduction Key Targets. Industries Affected. Geographical Focus. Infection Chain. Initial Findings. Looking into the decoy-document Technical Analysis Stage 1 - Malicious LNK Script Stage 2 - DUPERUNNER Implant Stage 3 - AdaptixC2 Beacon. Infrastructural Artefacts. Conclusion SEQRITE Protection. IOCs MITRE
0 Комментарии 0 Поделились 81 Просмотры 0 предпросмотр
Спонсоры
Спонсоры
Pinlap https://www.pinlap.com