13 Going on 14 — GFM: https://gofund.me/32671a27
Via USDOJ:
Justice Department Announces Court-Authorized Seizure of Domain Names Used in Furtherance of Spear-Phishing Campaign Posing as U.S. Agency for International Development
On or about May 25, malicious actors commenced a wide-scale spear-phishing campaign leveraging a compromised USAID account at an identified mass email marketing company. Specifically, the compromised account was used to send spear-phishing emails, purporting to be from USAID email accounts and containing a “special alert,” to thousands of email accounts at over one hundred entities.
Upon a recipient clicking on a spear-phishing email’s hyperlink, the victim computer was directed to download malware from a sub-domain of theyardservice[.]com. Using that initial foothold, the actors then downloaded the Cobalt Strike tool to maintain persistent presence and possibly deploy additional tools or malware to the victim’s network. The actors’ instance of the Cobalt Strike tool received C2 communications via other subdomains of theyardservice[.]com, as well as the domain worldhomeoutlet[.]com. It was those two domains that the Department seized pursuant to the court’s seizure order.
[…]
On May 28, pursuant to court orders issued in the Eastern District of Virginia, the United States seized two command-and-control (C2) and malware distribution domains used in recent spear-phishing activity that mimicked email communications from the U.S. Agency for International Development (USAID). This malicious activity was the subject of a May 27 Microsoft security alert, titled “New sophisticated email-based attack from Nobelium,” and a May 28 FBI and Cybersecurity and Infrastructure Security Agency joint cybersecurity advisory.
The Department’s seizure of the two domains was aimed at disrupting the malicious actors’ follow-on exploitation of victims, as well as identifying compromised victims. However, the actors may have deployed additional backdoor accesses between the time of the initial compromises and last week’s seizures.
On May 28, pursuant to court orders issued in the Eastern District of VA, the U.S. seized 2 command-and-control (C2) and malware distribution domains used in recent spear-phishing activity that mimicked emails from @USAID. Learn more at @TheJusticeDept: https://t.co/ze5b1nn67M pic.twitter.com/A2yTgtyeBU
— FBI Washington Field (@FBIWFO) June 1, 2021
Hackers linked to Russian intelligence seized an email system used by a U.S. agency and then mounted attacks on groups critical of Vladimir Putin.https://t.co/8LikNXp8ti
— Julia Davis (@JuliaDavisNews) May 28, 2021
You must be logged in to post a comment.