Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • The Startup World Cup is your chance to pitch in Silicon Valley and win $1.4 million
    • 13 Best Coolers for Sunshine and Nighttime (2026)
    • Which States Actually Have the Best Laws Against License Plate Surveillance?
    • Portable smart TV, art frame, tablet
    • Former Startmate boss Michael Batko is back in founder mode building with Hourglass AI
    • Why Sharing a Screenshot Can Get You Jailed in the UAE
    • The European Commission issues preliminary DSA findings against Meta, saying Instagram and Facebook fail to prevent under-13 users from accessing the services (Gian Volpicelli/Bloomberg)
    • Today’s NYT Mini Crossword Answers for April 29
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Wednesday, April 29
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»News»Russia takes unusual route to hack Starlink-connected devices in Ukraine
    News

    Russia takes unusual route to hack Starlink-connected devices in Ukraine

    Editor Times FeaturedBy Editor Times FeaturedDecember 12, 2024No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link

    “Microsoft assesses that Secret Blizzard both used the Amadey malware as a service (MaaS) or accessed the Amadey command-and-control (C2) panels surreptitiously to obtain a PowerShell dropper on the right track units,” Microsoft mentioned. “The PowerShell dropper contained a Base64-encoded Amadey payload appended by code that invoked a request to Secret Blizzard C2 infrastructure.”

    The final word goal was to put in Tavdig, a backdoor Secret Blizzard used to conduct reconnaissance on targets of curiosity. The Amdey pattern Microsoft uncovered collected info from machine clipboards and harvested passwords from browsers. It will then go on to put in a customized reconnaissance device that was “selectively deployed to units of additional curiosity by the menace actor—for instance, units egressing from STARLINK IP addresses, a standard signature of Ukrainian front-line navy units.”

    When Secret Blizzard assessed a goal was of excessive worth, it could then set up Tavdig to gather info, together with “person information, netstat, and put in patches and to import registry settings into the compromised machine.”

    Earlier within the yr, Microsoft mentioned firm investigators noticed Secret Blizzard utilizing instruments belonging to Storm-1887 to additionally goal Ukrainian navy personnel. Microsoft researchers wrote:

    In January 2024, Microsoft noticed a military-related machine in Ukraine compromised by a Storm-1837 backdoor configured to make use of the Telegram API to launch a cmdlet with credentials (provided as parameters) for an account on the file-sharing platform Mega. The cmdlet appeared to have facilitated distant connections to the account at Mega and certain invoked the obtain of instructions or recordsdata for launch on the goal machine. When the Storm-1837 PowerShell backdoor launched, Microsoft famous a PowerShell dropper deployed to the machine. The dropper was similar to the one noticed throughout the usage of Amadey bots and contained two base64 encoded recordsdata containing the beforehand referenced Tavdig backdoor payload (rastls.dll) and the Symantec binary (kavp.exe).

    As with the Amadey bot assault chain, Secret Blizzard used the Tavdig backdoor loaded into kavp.exe to conduct preliminary reconnaissance on the machine. Secret Blizzard then used Tavdig to import a registry file, which was used to put in and supply persistence for the KazuarV2 backdoor, which was subsequently noticed launching on the affected machine.

    Though Microsoft didn’t instantly observe the Storm-1837 PowerShell backdoor downloading the Tavdig loader, primarily based on the temporal proximity between the execution of the Storm-1837 backdoor and the statement of the PowerShell dropper, Microsoft assesses that it’s possible that the Storm-1837 backdoor was utilized by Secret Blizzard to deploy the Tavdig loader.

    Wednesday’s put up comes every week after each Microsoft and Lumen’s Black Lotus Labs reported that Secret Blizzard co-opted the instruments of a Pakistan-based menace group tracked as Storm-0156 to put in backdoors and gather intel on targets in South Asia. Microsoft first noticed the exercise in late 2022. In all, Microsoft mentioned, Secret Blizzard has used the instruments and infrastructure of at the least six different menace teams prior to now seven years.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    The European Commission issues preliminary DSA findings against Meta, saying Instagram and Facebook fail to prevent under-13 users from accessing the services (Gian Volpicelli/Bloomberg)

    April 29, 2026

    Alberta online gambling expansion sparks concern among First Nations casino operators

    April 29, 2026

    Better Markets urges courts to let states regulate prediction markets, not CFTC

    April 29, 2026

    Q&A with Sam Altman and AWS CEO Matt Garman about OpenAI’s new partnership with AWS, Bedrock Managed Agents, Trainium chips, and more (Ben Thompson/Stratechery)

    April 28, 2026

    Snapchat launches AI Sponsored Snaps, a conversational ad format in the Chat tab that lets users talk to brand-specific AI agents for product recommendations (Aisha Malik/TechCrunch)

    April 28, 2026

    AI researchers launch talkie, a 13B vintage language model trained on historical text with a 1930 cutoff, to see if it can replicate scientific breakthroughs (talkie)

    April 28, 2026

    Comments are closed.

    Editors Picks

    The Startup World Cup is your chance to pitch in Silicon Valley and win $1.4 million

    April 29, 2026

    13 Best Coolers for Sunshine and Nighttime (2026)

    April 29, 2026

    Which States Actually Have the Best Laws Against License Plate Surveillance?

    April 29, 2026

    Portable smart TV, art frame, tablet

    April 29, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    Designing for Functional Safety: A Developer’s Introduction

    August 16, 2025

    The Age360 Skyscraper Features Unique Exoskeleton Design

    April 20, 2025

    Top AI-Powered Investment Platforms to Watch

    February 18, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.