City
Epaper

Hackers targeting Indian govt via cyber-espionage campaign to steal secret docs: Report

By IANS | Updated: January 17, 2024 19:40 IST

New Delhi, Jan 17 Researchers have uncovered a highly sophisticated cyber-espionage campaign -- 'Operation RusticWeb', which the threat ...

Open in App

New Delhi, Jan 17 Researchers have uncovered a highly sophisticated cyber-espionage campaign -- 'Operation RusticWeb', which the threat actors are using to target various personnel within the Indian government to steal confidential documents, a new report said on Wednesday.

The campaign, first detected in October 2023, uses Rust-based malware and encrypted PowerShell commands, to exfiltrate confidential documents, according to Seqrite, the enterprise arm of global cybersecurity solutions provider, Quick Heal.

"The campaign is initiated with a phishing campaign, targeting government personnel. Threat actors have exploited both, compromised and fake domains, to host malicious payloads and decoy files, ranging from IPR forms to fake domains mimicking prestigious organisations like the Army Welfare Education Society (AWES)," the researchers said.

"The decoy files, designed to lure victims into the malicious web, include forms related to Defence Services Officers Provident Fund and presentations on initiatives with the Ministry of Defence," they added.

The hackers exfiltrate sensitive documents via a web-based service engine, adding a layer of sophistication to their cyber-espionage tactics.

The first observed infection chain heavily relied on Rust-based payloads, with a malicious shortcut file triggering an elaborate sequence leading to the exfiltration of sensitive data.

The second infection chain, observed in December, deployed maldocs using encrypted PowerShell commands, showcasing the threat actors' versatility and adaptability, according to the report. The final payload of the cyber-espionage campaign is a Rust-based malware that operates as a data stealer.

As per the researchers, this sophisticated malware not only steals files but also collects system information, ensuring an extensive reconnaissance capability.

The threat actors employ an anonymous public file-sharing engine, OshiUpload, for data exfiltration, avoiding the conventional use of dedicated command-and-control servers.

Disclaimer: This post has been auto-published from an agency feed without any modifications to the text and has not been reviewed by an editor

Open in App

Related Stories

NationalSenior Jharkhand leader Tarun Gupta returns to BJP after six years, Babulal Marandi welcomes him

NationalKavitha defends support to proposed ordinance for 42 per cent BC quota

EntertainmentNeetu Chandra appointed as Icon Face of Election Commission of Bihar

EntertainmentThe Bad Guys 2 Trailer: Outrageous Comedy, Real Emotion, and Double the Chaos!

NationalTunnel project row: BJP MP Tejasvi Surya challenges Dy CM Shivakumar to public debate

National Realted Stories

NationalTussle intensifies at Kerala University as ‘two’ registrars at work

National13-year-old boy electrocuted while retrieving footwear from school rooftop in Kerala

NationalIndian Army rescues pilgrims stranded on Amarnath Yatra route in Kashmir due to landslide, heavy rain

NationalTragedy Strikes in Madhya Pradesh as Heavy Rains Trigger House Collapse, Killing Infant

NationalAshok Gehlot questions Amit Shah on delay in Kanhaiyalal case probe