Spotlight

Top Voted
Sorry, there is nothing for the moment.


About us


Company



EAGERBEE, with updated and novel components, targets the Middle East

Cloud Analytics + Cyber security + Cybercrime + Global news ACS Marketing Team todayJanuary 10, 2025

Background
share close

The EAGERBEE backdoor, deployed at ISPs and governmental entities in the Middle East, has been analyzed to reveal new components and capabilities. The malware uses a novel service injector to inject the backdoor into running services, and employs several plugins for various malicious activities. The initial infection vector remains unclear, but some organizations were breached via the ProxyLogon vulnerability. The analysis uncovered potential links between EAGERBEE and the CoughingDown threat group, including code similarities and overlapping command and control infrastructure. The malware’s memory-resident architecture and ability to inject code into legitimate processes enhance its stealth capabilities, making detection challenging.

Reference:
https://securelist.com/eagerbee-backdoor/115175/
Adversary:
Malware Family:
EAGERBEE
Att&ck IDs:
T1033 – System Owner/User DiscoveryT1003 – OS Credential DumpingT1543.003 – Windows ServiceT1082 – System Information DiscoveryT1055 – Process InjectionT1505.003 – Web ShellT1016 – System Network Configuration DiscoveryT1083 – File and Directory DiscoveryT1049 – System Network Connections DiscoveryT1057 – Process DiscoveryT1078.001 – Default AccountsT1136 – Create AccountT1569.002 – Service ExecutionT1021.001 – Remote Desktop Protocol

United States (2)Singapore (1)Poland (1)United Kingdom (1)

THREAT INFRASTRUCTURE
type
indicator

Written by: ACS Marketing Team

Rate it

Post comments (0)

Leave a reply

Your email address will not be published. Required fields are marked *







Follow us

Powered by