A cyberespionage group believed to be associated with the Iranian government has been infecting Microsoft Exchange Servers with a new malware implant dubbed BellaCiao that acts as a dropper for additional payloads. The malware uses DNS queries to receive commands from attackers encoded into IP addresses.
According to researchers from Bitdefender, the attackers appear to customize their attacks for each particular victim including the malware binary, which contains hardcoded information such as company name, custom subdomains and IP addresses. Debugging information and file paths from compilation that were left inside the executable suggest the attackers are organizing their victims into folders by country code, such as IL (Israel), TR (Turkey), AT (Austria), IN (India), or IT (Italy).
More Stories
VanHelsingRaaS Expands Rapidly in Cybercrime Market
VanHelsingRaaS, a new ransomware-as-a-service program, infected three victims within two weeks of release, demanding ransoms of $500,000 Read More
Ukraine Railway Systems Hit by Targeted Cyber-Attack
Ukraine’s national railway company has suffered a “large-scale” cyber-attack, disrupting online services and operations Read More
Authorities Seize 1842 Devices in Africa’s Cybercrime Crackdown
Authorities in seven African countries have arrested 306 suspects and seized 1842 devices in Operation Red Card Read More
DeepSeek: A New Player in the Global AI Race
CIS analysts break down the rise of DeepSeek, a GenAI model that collects data and introduces security risks for users....
California AG Reminds 23andMe Customers of Data Deletion Rights Amid Bankruptcy Filing
Two years after a data breach that compromised almost seven million customers, 23andMe's CEO has resigned as the company files...
More Countries are Demanding Back-Doors to Encrypted Apps
Last month I wrote about the UK forcing Apple to break its Advanced Data Protection encryption in iCloud. More recently,...