Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Smoke Loader Attacking Financial Institutions Running Windows

admin by admin
Mar 20, 2024
in News
A A
0

The reason hackers go after financial institutions is because these places have valuable things like money, intellectual property, and sensitive customer information. 

Hacked financial systems can result in monetary gain by means of theft, blackmail or disservice interruption.

Cybersecurity researchers at Palo Alto Networks recently discovered that Smoke Loader malware has been attacking financial institutions running Microsoft Windows.

Smoke Loader Attacking Financial Institutions

Smoke Loader malware targeted Ukraine from May to November 2023 by UAC-0006. Ukraine faces an unprecedented surge in cyberattacks amidst the ongoing conflict, with global threat actors exploiting the situation.

SCPC SSSCIP identified Smoke Loader as a prominent malware strain in recent attacks.

Smoke Loader, aka Dofoil/Sharik, is a Windows backdoor with info-stealing capabilities linked to Russian cybercrime.

Document

Free Webinar : Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

:

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

AcuRisQ, that helps you to quantify risk accurately:


Advertised since 2011, it surged in Ukraine in 2023, targeting financial/govt orgs likely in a coordinated disruptive effort. 

Globally prevalent, it spreads via malicious emails/web vectors. The SCPC SSSCIP report analyzes 23 email attack waves from May-Nov 2023, providing technical insights for security professionals. 

Prevention involves cautious email/download habits, strong passwords, and cybersecurity awareness.

Smoke Loader (aka Dofoil/Sharik) is a malicious loader first advertised in 2011’s criminal underground.

With capabilities beyond loading other malware, it has been globally documented spreading via emails, web exploits like Rig, and as a payload from malware like Glupteba. 

Used by various groups against diverse targets worldwide, from recent Ukrainian attacks to Phobos ransomware campaigns, the actively marketed Smoke Loader is a versatile malware-as-a-service ideal for threat actors, making it a prime candidate in the reported Ukrainian incidents.

CERT-UA was first alerted on Smoke Loader activity by UAC-0006 in May 2023, issuing 6 more notices that year as UAC-0006 topped Ukraine’s financial crime ranks by December. 

This suspected Russian cybercrime group uses Smoke Loader to deploy malware stealing funds from Ukrainian enterprises, attempting to steal tens of millions of hryvnias in August-September alone per CERT-UA. 

The SCPC SSSCIP report details 23 Smoke Loader attack waves from May to December 2023, significantly heightening threats to Ukrainian accountants with a potential 1 million hryvnia weekly losses on average.

Smoke Loader attacks targeted Ukrainian organizations. Joint research with SCPC SSSCIP provided insights into attack vectors, payloads, objectives, and disrupting the attack chain.

Read the report for technical details. Prioritize security and smart online habits to defend against such threats.

Recommendations

Here below we have mentioned all the recommendations:-

  • Always be vigilant.
  • Avoid suspicious emails.
  • Do not click on links.
  • Make sure to not perform any downloads from unknown sources. 
  • Always use strong passwords. 
  • Make sure to stay informed about cyberthreats.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.



Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.