Dienstag, Dezember 5, 2023
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
Liga Technews
No Result
View All Result
  • Home
  • Marketing Tech
    • Artificial Intelligence
    • Cybersecurity
    • Blockchain and Crypto
    • Business Automation
  • Apps
  • Digital Transformation
  • Internet of Things
  • SaaS
  • Tech Investments
  • Contact Us
Liga Technews
No Result
View All Result
Command-and-control framework PhonyC2 attributed to Iran’s Muddywater group

Command-and-control framework PhonyC2 attributed to Iran’s Muddywater group

admin by admin
Juni 30, 2023
in Cybersecurity
0 0
0
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter



A beforehand unseen command-and-control (C2) framework known as PhonyC2 has been attributed to the Iranian state-sponsored group MuddyWater. 

The custom-made, and constantly creating PhonyC2 was utilized by the menace actor to use the log4j vulnerability within the Israeli SysAid software program, the assault towards Technion, an Israeli establishment, and the continuing assault towards the PaperCut print administration software program, in line with a report by Deep Instinct. 

„In the beginning of Could 2023, Microsoft’s Twitter submit talked about that they had noticed MuddyWater exploiting CVE-2023-27350 within the PaperCut print administration software program,“ Deep Intuition mentioned in its report, including that whereas Microsoft didn’t share any new indicators, they famous that MuddyWater was utilizing instruments from prior intrusions to hook up with their C2 infrastructure and referenced their weblog on the Technion hack, which the researchers already established was utilizing PhonyC2.

„About the identical time, Sophos printed indicators from numerous PaperCut intrusions they’ve seen. Deep Intuition discovered that two IP addresses from these intrusions are PhonyC2 servers based mostly on URL patterns,“ Deep Intuition mentioned. 

MuddyWater has been energetic since 2017 and is usually believed to be a subordinate unit inside Iran’s Ministry of Intelligence and Safety. Its prime targets embody Turkey, Pakistan, the UAE, Iraq, Israel, Saudi Arabia, Jordan, the US, Azerbaijan, and Afghanistan. The group primarily conducts cyberespionage actions and mental property (IP) theft assaults; on some events, they’ve deployed ransomware on targets.

Customized-made PhonyC2

Three malicious PowerShell scripts that have been part of the archive of PhonyC2_v6.zip have been recognized in April by Deep Intuition.

Related Posts

Shield your self from ticketing scams forward of the Premier League Summer time Sequence USA Tour
Cybersecurity

Shield your self from ticketing scams forward of the Premier League Summer time Sequence USA Tour

Dezember 5, 2023
How cybersecurity groups ought to put together for geopolitical disaster spillover
Cybersecurity

How cybersecurity groups ought to put together for geopolitical disaster spillover

Dezember 5, 2023
Provide-chain ransomware assault causes outages at over 60 credit score unions
Cybersecurity

Provide-chain ransomware assault causes outages at over 60 credit score unions

Dezember 5, 2023
New BLUFFS Bluetooth Assault Expose Gadgets to Adversary-in-the-Center Assaults
Cybersecurity

New BLUFFS Bluetooth Assault Expose Gadgets to Adversary-in-the-Center Assaults

Dezember 4, 2023
Cloud forensics – An introduction to investigating safety incidents in AWS, Azure and GCP
Cybersecurity

How group collaboration instruments and Cybersecurity can safeguard hybrid workforces

Dezember 4, 2023
Sophos DNS Safety – Be part of the EAP – Sophos Information
Cybersecurity

Sophos DNS Safety – Be part of the EAP – Sophos Information

Dezember 4, 2023
Next Post
The state of Europe’s AMR market

The state of Europe's AMR market

Schreibe einen Kommentar Antworten abbrechen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

Neueste Beiträge

  • OpenAI Rival Mistral AI Set to Elevate Funds from a16z and Others at $2B Valuation Dezember 5, 2023
  • Leveling Up Your Advertising and marketing Sport with Act-On Software program’s New Functionalities Dezember 5, 2023
  • Knowledgeable Spotlights Potential $25,000 Liquidity Sweep Dezember 5, 2023
  • GTM 71: Author Founder Tells All: Securing Enterprise Clients with a PLG Movement | Might Habib Dezember 5, 2023
  • Watch out for Expired or Compromised Code Signing Certificates Dezember 5, 2023

Categories

  • Apps (972)
  • Artificial Intelligence (794)
  • Blockchain and Crypto (3.270)
  • Business Automation (613)
  • Cybersecurity (1.180)
  • Digital Transformation (205)
  • Internet of Things (771)
  • Marketing Tech (474)
  • SaaS (809)
  • Tech Investments (803)

Liga Tech News

Welcome to Liga Tech News The goal of Liga Tech News is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Kategorien

  • Apps
  • Artificial Intelligence
  • Blockchain and Crypto
  • Business Automation
  • Cybersecurity
  • Digital Transformation
  • Internet of Things
  • Marketing Tech
  • SaaS
  • Tech Investments

Recent News

  • OpenAI Rival Mistral AI Set to Elevate Funds from a16z and Others at $2B Valuation
  • Leveling Up Your Advertising and marketing Sport with Act-On Software program’s New Functionalities
  • Knowledgeable Spotlights Potential $25,000 Liquidity Sweep
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

© 2023 Liga Tech News | All Rights Reserved

No Result
View All Result
  • Home
  • Marketing Tech
    • Artificial Intelligence
    • Blockchain and Crypto
    • Business Automation
    • Cybersecurity
  • Digital Transformation
  • Apps
  • Internet of Things
  • SaaS
  • Tech Investments
  • Contact Us

© 2023 Liga Tech News | All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In