The attackers relied on this mechanism to attempt to deploy an information collector on thousands of machines across over 100 countries, mainly in Brazil, China, France, Germany, Italy, Russia, Spain, and Turkey. Roughly 10% of the affected machines belong to various businesses and organizations.Using the information collected by the malware, the attackers identified systems of interest and infected them with a second, minimalistic backdoor.Only a dozen systems at government, scientific, manufacturing, and retail organizations in Belarus, Russia, and Thailand were infected with the backdoor, suggesting a targeted attack, Kaspersky says.Furthermore, the backdoor was used to deploy more complex malware, namely the QUIC RAT, against a single educational institution in Russia.“This manner of deploying the backdoor to a small subset of infected machines clearly indicates that the attacker had intentions to conduct the infection in a targeted manner. However, their intent – whether it is cyberespionage or ‘big game hunting’ – is currently unclear,” Kaspersky notes.Related:1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, IntercomRelated:SAP NPM Packages Targeted in Supply Chain AttackRelated:Are SBOMs Failing? Supply Chain Attacks Rise as Security Teams Struggle With SBOM DataRelated:Axios NPM Package Breached in North Korean Supply Chain Attack
Using the information collected by the malware, the attackers identified systems of interest and infected them with a second, minimalistic backdoor.Only a dozen systems at government, scientific, manufacturing, and retail organizations in Belarus, Russia, and Thailand were infected with the backdoor, suggesting a targeted attack, Kaspersky says.Furthermore, the backdoor was used to deploy more complex malware, namely the QUIC RAT, against a single educational institution in Russia.“This manner of deploying the backdoor to a small subset of infected machines clearly indicates that the attacker had intentions to conduct the infection in a targeted manner. However, their intent – whether it is cyberespionage or ‘big game hunting’ – is currently unclear,” Kaspersky notes.Related:1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, IntercomRelated:SAP NPM Packages Targeted in Supply Chain AttackRelated:Are SBOMs Failing? Supply Chain Attacks Rise as Security Teams Struggle With SBOM DataRelated:Axios NPM Package Breached in North Korean Supply Chain Attack
Only a dozen systems at government, scientific, manufacturing, and retail organizations in Belarus, Russia, and Thailand were infected with the backdoor, suggesting a targeted attack, Kaspersky says.Furthermore, the backdoor was used to deploy more complex malware, namely the QUIC RAT, against a single educational institution in Russia.“This manner of deploying the backdoor to a small subset of infected machines clearly indicates that the attacker had intentions to conduct the infection in a targeted manner. However, their intent – whether it is cyberespionage or ‘big game hunting’ – is currently unclear,” Kaspersky notes.Related:1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, IntercomRelated:SAP NPM Packages Targeted in Supply Chain AttackRelated:Are SBOMs Failing? Supply Chain Attacks Rise as Security Teams Struggle With SBOM DataRelated:Axios NPM Package Breached in North Korean Supply Chain Attack
Furthermore, the backdoor was used to deploy more complex malware, namely the QUIC RAT, against a single educational institution in Russia.“This manner of deploying the backdoor to a small subset of infected machines clearly indicates that the attacker had intentions to conduct the infection in a targeted manner. However, their intent – whether it is cyberespionage or ‘big game hunting’ – is currently unclear,” Kaspersky notes.Related:1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, IntercomRelated:SAP NPM Packages Targeted in Supply Chain AttackRelated:Are SBOMs Failing? Supply Chain Attacks Rise as Security Teams Struggle With SBOM DataRelated:Axios NPM Package Breached in North Korean Supply Chain Attack
“This manner of deploying the backdoor to a small subset of infected machines clearly indicates that the attacker had intentions to conduct the infection in a targeted manner. However, their intent – whether it is cyberespionage or ‘big game hunting’ – is currently unclear,” Kaspersky notes.Related:1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, IntercomRelated:SAP NPM Packages Targeted in Supply Chain AttackRelated:Are SBOMs Failing? Supply Chain Attacks Rise as Security Teams Struggle With SBOM DataRelated:Axios NPM Package Breached in North Korean Supply Chain Attack
Related:1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, IntercomRelated:SAP NPM Packages Targeted in Supply Chain AttackRelated:Are SBOMs Failing? Supply Chain Attacks Rise as Security Teams Struggle With SBOM DataRelated:Axios NPM Package Breached in North Korean Supply Chain Attack
Related:SAP NPM Packages Targeted in Supply Chain AttackRelated:Are SBOMs Failing? Supply Chain Attacks Rise as Security Teams Struggle With SBOM DataRelated:Axios NPM Package Breached in North Korean Supply Chain Attack
Related:Are SBOMs Failing? Supply Chain Attacks Rise as Security Teams Struggle With SBOM DataRelated:Axios NPM Package Breached in North Korean Supply Chain Attack
Related:Axios NPM Package Breached in North Korean Supply Chain Attack
Ionut Arghire is an international correspondent for SecurityWeek.
Source: SecurityWeek