Espionage Group Targets U.S. Utilities With Sophisticated Spy Tool
Arthur T Knackerbracket has found the following story:
The APT known as TA410 has added a modular remote-access trojan (RAT) to its espionage arsenal, deployed against Windows targets in the United States' utilities sector.
According to researchers at Proofpoint, the RAT, called FlowCloud, can access installed applications and control the keyboard, mouse, screen, files, services and processes of an infected computer, with the ability to exfiltrate information to a command-and-control (C2) provider. It appears to be related to previous attacks delivering the LookBack malware.
The RAT first scurried onto the scene last summer as part of a spear-phishing campaign. Utility providers received training- and certification-related emails with subject lines such as PowerSafe energy educational courses (30-days trial)," containing portable executable (PE) attachments, according to a Monday Proofpoint analysis.
To make the effort more convincing, the threat actor-controlled domains that delivered the emails impersonated energy-sector training services, and used subdomains which contained the word engineer."
[APT - Advanced Persistent Threat]
Read more of this story at SoylentNews.