Security News > 2021 > March > Microsoft reveals 3 new malware strains used by SolarWinds hackers

Microsoft has revealed information on newly found malware the SolarWinds hackers deployed on victims' networks as second-stage payloads.
The company now tracks the "Sophisticated attacker" who used the Sunburst backdoor and Teardrop malware during the SolarWinds supply-chain attack as Nobelium.
Security researchers with the Microsoft Threat Intelligence Center and the Microsoft 365 Defender Research Team found three new malware strains named GoldMax, Sibot, and GoldFinder.
The Nobelium hackers used these malware strains during late-stage activity between August and September 2020.
Sibot: VBScript-based malware used for maintaining persistence and downloading additional malware payloads using a second-stage script.
FireEye researchers believe the new malware dubbed Sunshuttle is linked to the SolarWinds hackers tracked as UNC2452, StellarParticle, SolarStorm, Dark Halo, and now Nobelium.
News URL
Related news
- Chinese hackers use custom malware to spy on US telecom networks (source)
- New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems (source)
- Microsoft Teams tactics, malware connect Black Basta, Cactus ransomware (source)
- Microsoft: North Korean hackers join Qilin ransomware gang (source)
- Microsoft admits GitHub hosted malware that infected almost a million devices (source)
- Microsoft: New RAT malware used for crypto theft, reconnaissance (source)
- Microsoft Trust Signing service abused to code-sign malware (source)
- Microsoft Trusted Signing service abused to code-sign malware (source)
- New Android malware uses Microsoft’s .NET MAUI to evade detection (source)
- Chinese FamousSparrow hackers deploy upgraded malware in attacks (source)