Ad End 1 August 2025
Ad Ends 13 July 2025
ad End 25 October 2025
Ad Ends 20 April 2025
Ad expire at 5 August 2024
banner Expire 9 June 2025
banner Expire 25 October 2025
banner Expire 10 May 2025
What's new
Wizard's shop 2.0
Money Club cc shop
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
Yale Lodge
Kfc CLub
adv exp at 30 July 2025
Carding.pw carding forum
BidenCash Shop

Transparent Tribe attacking diplomats and military in 27 countries

File_closed07

TRUSTED VERIFIED SELLER
Staff member
Joined
Jun 13, 2020
Messages
7,903
Reaction score
942
Points
212
Awards
2
  • trusted user
  • Rich User
Attackers use a tool designed to infect USB devices in their attacks.




The Transparent Tribe cybercriminal group (also known as PROJECTM and MYTHIC LEOPARD) has launched malicious campaigns against diplomats and military personnel in 27 countries. Most of the victims were located in Afghanistan, Pakistan, India, Iran and Germany. Attackers armed themselves with a new tool designed to infect USB devices and spread malware to other systems.

The attack chain begins with targeted phishing. Fraudulent messages are sent with malicious Microsoft Office documents containing an embedded macro to install the Crimson Remote Access Trojan. The Trojan is capable of many functions, including connecting to a C&C server to steal data, update malware remotely, take screenshots, and hack microphones and webcams for audio and video surveillance.

According to experts from Kaspersky Lab, the malware is capable of stealing files from removable media, performing keylogging and stealing credentials from browsers.

The Transparent Tribe also uses malware such as .NET-based Crimson and Python-based Peppy. In recent attacks, criminals have incorporated a new functionality into the Crimson Trojan called USBWorm. It consists of two main components: a tool to steal files from removable drives and a worm function to infect other vulnerable devices.

If a USB drive is connected to the infected PC, a copy of the Trojan is invisibly installed on the removable drive. The malware enumerates all the directories on the disk and then saves a copy of the Trojan in the root directory of the disk. The directory attribute is then changed to "hidden" and the fake Windows icon is used to entice victims to click and execute a payload when trying to access directories.
 
Ad End 1 February 2024
Top