Site icon TheCyberThrone

Clasiopa threat actor targeting Researchers

Advertisements

Researchers have discovered previously undocumented threat group unknown targeting a materials research organization in Asia and called a Clasiopa.

Clasiopa has a distinct toolset, which includes custom malware (Backdoor.Atharvan).The infection vector used by Clasiopa is unknown. But the evidence suggests that the attackers gain access through brute force attacks on public facing servers.

The TTP’s observed are as follows

A few of the evidence suggests that the attackers used two legitimate software packages. One compromised computer was running Agile DGS and Agile FD servers

Array of tools used by the attacker

Motivation of Clasiopa is not known. A Hindi mutex is used in the Atharvan backdoor: “SAPTARISHI-ATHARVAN-101.” The backdoor also sends a post request to a C&C server with the arguments:

While these details could suggest that the group is based in India, it is also quite likely that the information was planted as false flags, with the password in particular seeming to be an overly obvious clue.

This research was documented by researchers from Symantec

Indicators of Compromise

Exit mobile version