LilacSquid APT Uses Open Source Tools to Utilize QuasarRAT

Published:

spot_img

Researchers uncover LilacSquid: a new threat actor linked to data exfiltration attacks across multiple sectors

A new and mysterious threat actor named LilacSquid has been identified by researchers, linking them to data exfiltration attacks across various sectors in the United States, Europe. This previously unknown group has been associated with tactics similar to North Korean threat actor Andariel, a sub-cluster within the notorious Lazarus Group.

According to Cisco Talos, LilacSquid’s methods for initial compromise include exploiting known vulnerabilities and using stolen credentials to breach Internet-facing application servers. Once a system is breached, they utilize tools like MeshAgent and InkLoader to connect to a command-and-control server for reconnaissance activities. Additionally, LilacSquid deploys a custom version of the QuasarRAT Trojan called PurpleInk, capable of performing various malicious tasks such as collecting system information and launching remote shells.

Furthermore, LilacSquid has been using Secure Socket Funneling (SSF) to establish tunnels to remote servers, potentially to facilitate data exfiltration. The group focuses on maintaining long-term access to compromised organizations, aiming to steal valuable data for their own malicious use.

Targeted organizations include information technology firms in the US, energy companies in Europe, and the pharmaceutical sector in Asia. With their sophisticated tactics and focus on data exfiltration, LilacSquid poses a significant threat to organizations worldwide. Stay vigilant and ensure your systems are secure against such advanced persistent threats.

spot_img

Related articles

Recent articles

Leaked iPhone Hacking Tool Hits Dark Web: Government Resource in the Hands of Cyber Criminals

Cybersecurity Alert: Hacking Toolkit Coruna Falls into Criminal Hands In a troubling development, security researchers have revealed that a sophisticated hacking toolkit, initially linked to...

149 DDoS Attacks Target 110 Organizations Across 16 Countries in Wake of Middle East Conflict

Surge in Hacktivist Activity Amid U.S.-Israel Military Actions Recent developments in cybersecurity have raised alarms among experts regarding a notable uptick in hacktivist operations. This...

Ajman Ruler Enacts Law for Managing Lost and Abandoned Property

New Law on Lost and Abandoned Property in Ajman Introduction of Law No. (2) of 2026 His Highness Sheikh Humaid bin Rashid Al Nuaimi, the Ruler...

Mobile Banking Evolution: Access Your CIBIL Score Instantly

New Delhi | The digital banking landscape in India is evolving at an astonishing pace, significantly altering how customers interact with their financial institutions....