Posted inSecurity

Updated threat actor to attack cryptocurrency and foreign exchange companies

DeathStalker is an infamous hack-for-hire APT actor that Kaspersky monitors since 2018, and which mainly targets law firms and organizations in the financial sector.

Kaspersky researchers tracks attack campaigns from the DeathStalker hack-for-hire group since 2018. Recent analysis shows that the threat actor updated its evasive “VileRat” toolset to attack cryptocurrency and foreign currency exchange companies in United Arab Emirates, Kuwait, Bulgaria, Cyprus, Germany, the Grenadines, Malta, and Russia in 2022.

DeathStalker is an infamous hack-for-hire APT actor that Kaspersky monitors since 2018, and which mainly targets law firms and organisations in the financial sector. The threat actor stands out since its attacks do not seem to be politically or financially motivated. Kaspersky researchers believe DeathStalker acts as a mercenary organisation, offering specialised hacking or financial intelligence services.

In 2020, Kaspersky researchers published an overview of DeathStalker’s profile and malicious activities, including their Janicab, Evilnum, PowerSing and PowerPepper campaigns. Company’s experts discovered a new and highly evasive infection, based on the “VileRAT” Python implant, in mid-2020.  Experts have been closely monitoring actor’s activity since and discovered it aggressively targeted foreign currency (FOREX) and cryptocurrency trading companies all over the world in 2022.

VileRat is typically deployed after an intricate infection chain, which starts from spearphishing emails. This summer, the attackers also leveraged chatbots that are embedded in targeted companies’ public websites to send malicious documents. The DOCX documents are frequently named using the “compliance” or “complaint” keywords (as well as the name of the targeted company), suggesting the attacker is answering an identification request or reporting an issue, in order to veil the attack.

VileRat does not show any interest in targeting particular countries, instead Kaspersky researchers report indiscriminate advanced attacks using VileRat all around the globe , with compromised organisations in Bulgaria, Cyprus, Germany, the Grenadines, Kuwait, Malta, the United Arab Emirates and Russia. The identified organisations range from recent startups to established industry leaders.

‘Escaping detection has always been a goal for DeathStalker, for as long as we’ve tracked the threat actor. But the VileRAT campaign took this desire to another level: it is undoubtedly the most intricate, obfuscated and tentatively evasive campaign we have ever identified from this actor. We believe DeathStalker’s tactics and practices are sufficient (and proven to be) to act on soft targets who may not be experienced enough to withstand such a level of determination, and may not have made security one of their organisation’s top priorities, or who frequently interact with third parties that have not done so,’ comments Pierre Delcher, Senior Security Researcher at Kaspersky’s GReAT.