https://ift.tt/prcPCqG How To Prepare For Your Virtual Doctor Visit To Get The Most From Your Consultation
https://ift.tt/prcPCqG How To Prepare For Your Virtual Doctor Visit To Get The Most From Your Consultation
- Get link
- X
- Other Apps
Kapeka, also known as KnuckleTouch, is a sophisticated backdoor malware that has been making waves in the cybersecurity world.
Initially appearing in mid-2022, it wasn’t until 2024 that Kapeka was formally tracked due to its involvement in limited-scope attacks, particularly in Eastern Europe.
The Sandstorm Connection Kapeka is linked to the Sandstorm Group, operated by Russia’s Military Unit 74455, known for its disruptive cyber activities.
This group, also referred to as Sandworm, has a history of targeting Ukraine’s critical infrastructure amidst geopolitical tensions.
Are you from SOC, Threat Research, or DFIR departments? If so, you can join an online community of 400,000 independent security researchers:
If you want to test all these features now with completely free access to the sandbox:
Kapeka utilizes a dropper malware to initiate the infection process.
This dropper deploys the actual backdoor file (a Windows DLL) disguised as a “.wll” file and positions it within system directories like “ProgramData” or “AppData.”
Kapeka communicates with its command-and-control (C2) server using the WinHttp API, exchanging data in JSON format.
The C2 configuration is encrypted with AES-256 for enhanced security.
Here’s a breakdown of Kapeka’s key functionalities:
Task Execution: Based on C2 server commands, Kapeka can perform various actions on the compromised system, including:
These features pose significant challenges to detection and underline the backdoor’s advanced capabilities.
Post Investigation, LOGPOINT recommends organizations leverage security tools like SIEM (Security Information and Event Management) solutions to detect suspicious activities.
Here are some potential indicators of compromise (IOCs) to look for:
Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide
The post SandStorm Hackers Added New Kapeka Tool to it’s Arsenal appeared first on Cyber Security News.
Comments
Post a Comment
Commenter vous !