Financial organizations in French-speaking African countries are being subjected to attacks by the Bluebottle cybercrime operation, which has been leveraging living-off-the-land attacks and generic malware, reports SiliconAngle.
Bluebottle, which has been linked with the OPERA1ER group may have used spear-phishing as an attack vector, with malicious French-language, job-themed files likely to be used as lures in its attacks, a report from Symantec revealed. Bluebottle was also likely to have mounted its job-themed malware as CD-ROMs, with the malware including the shellcode-based downloader GuLoader, which facilitates decoy binaries prior to the deployment of another NSIS script for obfuscated shellcode injection.
The report noted that persistence and credential theft may be the goal of Bluebottle with its operations.
"The effectiveness of its campaigns means that Bluebottle is unlikely to stop this activity. It appears to be very focused on Francophone countries in Africa, so financial institutions in these countries should remain on high alert," said researchers.
This week Dr. Doug discusses: Empathy, hacking back, typosquatting, Bitwarden, Lexmark, Exchange, Russians, Iranians, Dragonbridge, Derek Johnson talks about Hive and more on the Security Weekly News.
North Korean hackers have stolen $630 million in cryptocurrency assets in 2022, the highest on record, reports Reuters. Sophisticated techniques have been leveraged by North Korean threat actors to facilitate the record-high theft of virtual assets, which are being allocated toward its nuclear weapons programs, according to a United Nations report. Such a figure comes after a cybersecurity firm earlier reported that more than $1 billion in cryptocurrency have been stolen by North Koreans last year. "The variation in USD value of cryptocurrency in recent months is likely to have affected these estimates, but both show that 2022 was a record-breaking year for DPRK (North Korea) virtual asset theft," said the U.N. report.
Several financial institutions in Brazil have been targeted by the novel Android banking trojan PixPirate that exploits the PIX payments platform for fraudulent activities, according to The Hacker News.