HomeVulnerabilityRussian APT group Curly COMrades employs novel backdoor and persistence methods

Russian APT group Curly COMrades employs novel backdoor and persistence methods

“By hijacking this CLSID, risk actors acquire a singular persistence mechanism, permitting them to revive their MucorAgent backdoor throughout one in all these periodic NGEN optimization scans,” the researchers discovered. “A vital benefit of this methodology is stealth and execution underneath the extremely privileged SYSTEM account. This explicit method, leveraging CLSID hijacking along with NGEN, is unprecedented in our observations.”

Along with MucorAgent, the attackers additionally deployed a authentic distant monitoring and administration (RMM) device referred to as Distant Utilities. The abuse of RMM instruments has grow to be widespread amongst each APT and cybercrime teams.

“The marketing campaign analyzed revealed a extremely persistent and adaptable risk actor using a variety of recognized and customised methods to ascertain and preserve long-term entry inside focused environments,” the researchers stated. “The attackers relied closely on publicly out there instruments, open-source initiatives, and LOLBins, exhibiting a choice for stealth, flexibility, and minimal detection relatively than exploiting novel vulnerabilities.”

See also  Deep Intuition goes deeper with ‘preventive’ storage safety
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular