PseudoManuscrypt Spyware Update

9978770477?profile=RESIZE_400xTens of thousands of devices around the world, including many industrial control systems (ICS) and government computers, have been targeted in what appears to be an espionage campaign that involves a new piece of malware now named PseudoManuscrypt, Kaspersky recently reported. Manuscrypt, aka NukeSped, is a family of malware tools that have been used in espionage campaigns in the past. One such was a February spear-phishing campaign linked to Lazarus a prolific North Korean APT that used the Manuscrypt malware family’s ‘ThreatNeedle’ tool cluster to attack defense companies.

The attacks targeted 35,000 devices in 195 countries between January and November 2021, including devices housed by high-profile organizations. Roughly seven percent of the targets were ICS, with the engineering and building automation sectors being most impacted. Attacks were also aimed at military industrial enterprises and research laboratories.

In many cases, the attackers targeted engineering computers, including devices used for 3D and physical modeling, which led Kaspersky researchers to believe that the goal may be industrial espionage. However, the company noted that the number of victims is large and it could not determine a clear focus on a specific type of industrial organization.  Nearly one-third of the non-ICS devices targeted in this campaign were located in Russia, India and Brazil. As for ICS, the highest percentage of targets was observed in India, Vietnam and Russia.

9978775680?profile=RESIZE_584x

Kaspersky has named the new spyware PseudoManuscrypt due to similarities to the Manuscrypt malware used by the North Korea-linked Lazarus group in attacks on the defense industry.

On the other hand, the malware uses the KCP protocol to connect to its command and control (C&C) server. The KCP protocol, whose use by malware is uncommon, has also been leveraged by the China-linked threat group APT41 in its attacks on industrial organizations.

The malware samples also contain comments written in Chinese, the malware connects to a cloud storage service offered by Chinese company Baidu, and the threat specifies Chinese as the preferred language when connecting to its C&C server.  Kaspersky said it cannot definitively link the PseudoManuscrypt campaign to Lazarus or any other known threat group.

The malware can steal VPN credentials, log keystrokes, capture the content of the screen (both images and video), record sound captured by the microphone, and steal clipboard and OS event log data.  PseudoManuscrypt has been distributed using pirated software installer archives including ones related to ICS software likely delivered by a Malware-as-a-Service platform. In some cases, the malware was delivered by the Glupteba botnet.

Glupteba is a loader with information-stealing and traffic routing functionality. It is designed primarily to install other viruses on infected PCs but can do much more than that. In addition, it is being constantly updated, making this virus one to watch out for. Global rank 35 Week rank 30 Month rank 32 IOCs 3484 Last Seen at 27 November, 2021

“Despite collecting and analyzing a large amount of data, it seems to us that many of our findings remain unexplained and do not fit any known schemes,” Kaspersky said. “Thus, we cannot say for certain whether the campaign is pursuing criminal mercenary goals or goals correlating with some governments’ interests.”

Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization. For questions, comments or assistance, please contact the office directly at 1-844-492-7225, or feedback@wapacklabs.com 

 

Weekly Cyber Intelligence Briefings:


https://www.redskyalliance.org/
https://www.wapacklabs.com/
https://www.linkedin.com/company/64265941 


Weekly Cyber Intelligence Briefings:


REDSHORTS - Weekly Cyber Intelligence Briefings
https://attendee.gotowebinar.com/register/3702558539639477516

 

Article HERE 

 

 

https://www.securityweek.com/thousands-industrial-systems-targeted-new-pseudomanuscrypt-spyware

 

E-mail me when people leave their comments –

You need to be a member of Red Sky Alliance to add comments!