New hacker group named Hydrochasma appears

 

new hacker group named Hydrochasma is targeting medical companies in Asia that have ties with COVID-19 vaccines. 

The threat actor may expand its scope of attack soon.

  • The first step from the hacker group is using phishing to compromise its targets through email.
  • Secondly, a Fast Reverse Proxy is dropped on the targeted system that ensures the threat actor can gain remote access.
  • Researchers have tracked other common malware used in the group's campaigns, such as the Cobalt Strike Beacon, Gogo scanning tool, and Fscan.
  • The targeted systems have not had their information stolen so far, but the breach leaves space for the hackers to steal it remotely at any given time.
  • The new threat actor uses exclusively public tools to breach its victims, making it harder to track.

Post a Comment

Previous Next

Contact Form