Cyber Criminals Target African Financial Institutions Using Open-Source Tools

Published:

spot_img

Rising Cyber Threats to Financial Institutions in Africa

An Ongoing Wave of Cyber Attacks

Cybersecurity experts are increasingly highlighting a troubling series of cyber attacks targeting financial institutions across Africa. These attacks have been active since at least July 2023, using a combination of open-source and publicly available tools to maintain persistent access to compromised networks.

Tracking the Threat: CL-CRI-1014

Known by the moniker CL-CRI-1014, this cyber threat is categorized by Palo Alto Networks’ Unit 42. The name indicates a "cluster" of criminal activity, with "CRI" symbolizing the underlying criminal motives associated with these attacks.

The Goals of the Attacks

The principal aim behind these malicious operations is believed to be securing initial access to networks, which is then sold to other criminal entities on underground forums. This makes the perpetrators Initial Access Brokers (IAB), positioning them to profit from their illicit endeavors.

Tactics and Techniques Used by Threat Actors

Researchers Tom Fakterman and Guy Levi have observed that these threat actors employ several deceptive strategies to mask their true intentions. Specifically, they replicate file signatures from reputable applications, thereby camouflaging their tools to evade detection. "Threat actors often spoof legitimate products for malicious purposes," they explained, illuminating a concerning trend in cybercrime.

Tools of the Trade

The attacks are characterized by the utilization of several key tools. These include:

  • PoshC2 for establishing command-and-control (C2) connections.
  • Chisel for tunneling malicious network traffic.
  • Classroom Spy for remote administration and surveillance.

While the specific entry methods used by these attackers remain somewhat obscure, once a foothold in the network is attained, the attackers typically deploy MeshCentral Agent and later Classroom Spy to exert control over infected machines. Chisel is then used to bypass firewalls, ultimately facilitating the spread of PoshC2 to additional Windows hosts within the compromised network.

Evasion Techniques

In their efforts to evade detection, these attackers disguise their payloads as legitimate software, often utilizing icons from trusted applications such as Microsoft Teams, Palo Alto Networks Cortex, and Broadcom VMware Tools. They establish persistence on compromised systems through multiple methods, including:

  • Setting up a service.
  • Creating a Windows shortcut (LNK) file to launch the tool from the Startup folder.
  • Scheduling a task under the name “Palo Alto Cortex Services.”

Credential Theft and Proxy Setup

In various cases, researchers have noted that cybercriminals have stolen user credentials to establish a proxy using PoshC2. This allows them to communicate more securely with the C2 server. "PoshC2 can use a proxy to communicate with a command-and-control (C2) server," the researchers remarked, indicating a tailored approach by the threat actors for specific targets.

Previous Incidents Involving PoshC2

This isn’t the first instance of PoshC2 being leveraged against financial institutions in Africa. In September 2022, Check Point reported on a spear-phishing campaign dubbed DangerousSavanna. This operation targeted financial and insurance companies across several African nations, distributing tools like Metasploit, PoshC2, and AsyncRAT.

The Emergence of New Ransomware Groups

As these cyber threats evolve, Trustwave SpiderLabs recently identified a new ransomware group named Dire Wolf, which has already compromised 16 victims across various countries, including the U.S., Australia, and Singapore. This group primarily targets sectors such as technology, manufacturing, and financial services.

The Nature of Dire Wolf Ransomware

Analysis of the Dire Wolf ransomware shows it is developed in Golang and possesses capabilities to disable system logging and terminate critical services, as well as applications, potentially hindering recovery efforts by deleting shadow copies. "While the techniques used by Dire Wolf for initial access and lateral movements are currently unknown, organizations should adhere to good security practices and monitor for the techniques identified in this analysis," the cybersecurity firm advised.

Conclusion

As cyber threats targeted at financial organizations in Africa continue to evolve, staying vigilant and implementing robust cybersecurity measures remains paramount. By understanding the tactics and motivations behind these attacks, institutions can better prepare to defend against them while securing their operations in a turbulent digital landscape.

spot_img

Related articles

Recent articles

BreachForums Making a Comeback in Days!

BreachForums Planning a Comeback Amid Ongoing Legal Struggles BreachForums, a notorious online hub for hackers, is gearing up for a revival despite recent law enforcement...

Limited-Time Maternity and Baby Essentials Flash Sales!

Momcozy Unveils Exciting Prime Day Sale Introduction to the Sale In an exciting announcement for parents and caregivers, Momcozy, a globally recognized maternity and baby care...

Pro-Iran Hacktivists Expose Personal Records from 2024 Saudi Games

Major Cyberattack Targets Saudi Games: A Look into the Cyber Fattah Incident Introduction to Cyber Fattah's Breach In a significant cyber incident, a pro-Iranian hacktivist group...

12 Must-Watch Documentaries About the Dark Web

Exploring the Dark Web: A Look Through Documentaries and Movies The internet is a vast landscape, and hidden within it lies the Dark Web—a realm...