Security News > 2020 > January > Iranian Hackers Target U.S. Gov. Vendor With Malware

Iranian Hackers Target U.S. Gov. Vendor With Malware
2020-01-31 20:42

Researchers at Intezer uncovered the campaign after detecting a malicious file in January, purporting to be an employee satisfaction survey for Westat employees and customers.

"The technical analysis of the new malware variants reveals this Iranian government-backed group has invested substantial efforts into upgrading its toolset in an attempt to evade future detection."

The downloaded executable file is actually a new version of the TONEDEAF malware, a backdoor commonly used by APT34 as a custom tool.

TONEDEAF 2.0, as researchers call it, serves the same purpose as the original malware, with the same general flow and functionality.

"In contrast to the original TONEDEAF, TONEDEAF 2.0 contains solely arbitrary shell execution capabilities, and doesn't support any predefined commands. It's also more stealthy and contains new tricks such as dynamic importing, string decoding and a victim deception method," researchers said.


News URL

https://threatpost.com/iran-hackers-us-gov-malware/152452/