Expert Insight On WildPressure Develops New Malware Toolset

BACKGROUND:

Novel malware, initially identified in March 2020 and dubbed Milum, has now been retooled with a PyInstaller bundle containing a trojan dropper compatible with Windows and macOS systems, according to researchers. Compromised endpoints allow the advanced persistent threat (APT) group to download and upload files and executing commands. Kaspersky published its latest findings tied to the APT and malware, which it first discovered and reported on in March 2020. At that time, researchers noted WildPressure targeted Middle East organizations with a C++ version of a trojan it called Milum.

Experts Comments

July 08, 2021
Lewis Jones
Threat Intelligence Analyst
Talion

Python-based multi-OS Trojan, which makes use of publicly available third-party code, is engineered to beacon the victim machine's hostname, machine architecture, and OS release name to a remote server and check for installed anti-malware products. After this, it awaits commands from the server that allows it to download and upload arbitrary files, execute commands, update the Trojan, and erase its traces from the infected host.

 The VBScript variant, named "Tandis," features similar

.....Read More

Python-based multi-OS Trojan, which makes use of publicly available third-party code, is engineered to beacon the victim machine's hostname, machine architecture, and OS release name to a remote server and check for installed anti-malware products. After this, it awaits commands from the server that allows it to download and upload arbitrary files, execute commands, update the Trojan, and erase its traces from the infected host.

 The VBScript variant, named "Tandis," features similar capabilities to that of Guard and Milum, while leveraging encrypted XML over HTTP for command-and-control (C2) communications.

 Whilst the new variants have not yet been seen on a large scale, historically the group has targeted organisations in the oil and gas industry. Therefore, going forward the best precautions for both individuals and organisations to take is to stay alert to these kinds of attacks and block any indicators of compromise.

  Read Less
What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.