ACTINIUM is a cyber organization that exploits sensitive data from the government, military, and non-governmental organizations.

ACTINIUM is a cyber organization that exploits sensitive data from the government, military, and non-governmental organizations.

A cybersecurity hacking organization, has lately revealed that it is sending out a wave of spear-phishing emails.

However, it has recently been uncovered that the ACTINIUM cyber gang is stealing critical data from the following Ukrainian industries: -

  • Government
  • Military
  • NGO
  • Judiciary
  • Law enforcement

?This dangerous organization is relentless in its pursuit of Ukrainian enterprises and other organizations with Ukrainian links. The cyber group has been carrying out similar assaults since October 2021.

Not only that but it was determined after a comprehensive investigation that the attackers were known as Armageddon and ACTINIUM.

However, throughout an examination, cybersecurity experts employed several tactics to track down the assault.

To trace the assaults, the operators added a tracking pixel-like Web element that framed which programs were deployed in this attack; hence, we have stated the binaries below: -

  • PowerPunch
  • Pterodo
  • Quietsieve

?Downloaders and stagers

?Furthermore, the ACTINIUM cyber-crime syndicate uses over 25 distinct domain names and over 80 distinct IP addresses to support payload staging and its C2 infrastructure.

Security researchers discovered six stagers and downloaders in this cybersecurity attack, which we've listed below: -

  • ?DinoTrain
  • DilongTrash
  • Obfuberry
  • PowerPunch
  • DessertDown
  • Obfumerry

?Apart from that, several security alerts will assist users in?

identifying such attacks, and they are listed below: -

· Suspicious script execution.

· Suspicious dynamic link library loaded.

· Suspicious screen capture activity.

· Staging of sensitive data.

· An anomalous process is executing the encoded command.

It is vital to be vigilant since this sort of threat warning might be generated by unrelated threat action.

Terrorists are targeting the military, non-governmental organizations (NGOs), the judiciary, law enforcement, and charitable organizations.

The threat actors' primary objective is to exfiltrate all sensitive information to keep access to the system and hijack it for their own goals.

要查看或添加评论,请登录

Aquila I的更多文章

社区洞察

其他会员也浏览了