A campaign utilizing malicious LNK files is observed, targeting individuals with a background or interest in human rights issues. The attackers use MSBuild to deliver a stealthy, fileless backdoor payload, which enables them to execute commands and take control of infected systems. The campaign is attributed to the Turla APT group from Russia.

34m read timeFrom cyble.com
Post cover image
Table of contents
Key TakeawaysOverviewInfection chainTechnical AnalysisFinal Payload – Tiny BackdoorThreat Actor Attribution to Turla APT GroupConclusionRecommendationsMITRE ATT&CK® TechniquesIndicators of Compromise (IOCs)Yara ruleReferences

Sort: