India faces evolved cyber espionage with novel Discord hack
- by nlqip
The UPX-packed ELF, apart from DSOP.pdf, has the DISGOMOJI malware payload which, upon execution, reads and exfiltrates system information including IP address, username, hostname, operating system, and the current working directory. Apart from the main functions, DISGOMOJI also downloads a shell script uevent_seqnum.sh, to check for connected USB devices and copy the content of those devices to a local folder on the infected system.
The research firm, additionally, discovered the campaign occasionally using the Dirty Pipe vulnerability (tracked as CVE-2022-0847), a privilege escalation bug that affects BOSS9 systems, which has wild exploits even months after a fix was rolled out.
Discord C2 for evasion
The campaign uses a custom fork of the open source project discord-C2. The modified version of this project uses emojis in the Discord service for DISGOMOJI’s C2 communications.
Source link
lol
The UPX-packed ELF, apart from DSOP.pdf, has the DISGOMOJI malware payload which, upon execution, reads and exfiltrates system information including IP address, username, hostname, operating system, and the current working directory. Apart from the main functions, DISGOMOJI also downloads a shell script uevent_seqnum.sh, to check for connected USB devices and copy the content of those…
Recent Posts
- Arm To Seek Retrial In Qualcomm Case After Mixed Verdict
- Jury Sides With Qualcomm Over Arm In Case Related To Snapdragon X PC Chips
- Equinix Makes Dell AI Factory With Nvidia Available Through Partners
- AMD’s EPYC CPU Boss Seeks To Push Into SMB, Midmarket With Partners
- Fortinet Releases Security Updates for FortiManager | CISA