Kaspersky Lab detected PseudoManuscrypt malware that attacks industrial organizations
Kaspersky ICS CERT experts detected the PseudoManuscrypt malware, which attacked more than 35,000 computers in 195 countries between January 20 and November 10, 2021. The list of attacked objects includes a significant number of industrial and government organizations, including enterprises of the military-industrial complex and research laboratories.
Researchers say that at least 7.2% of computers attacked by PseudoManuscrypt are part of industrial automation systems (ICS) in organizations of various industries.
The malware was named PseudoManuscrypt because its loader is similar to the Manuscrypt malware loader, which is part of the arsenal of the Lazarus hack group.
The PseudoManuscrypt downloader enters the system through the Malware-as-a-Service (MaaS) platform, which distributes malicious installers under the guise of pirated software. Sa pipila ka mga kaso, this happened through the Glupteba botnet (the main installer of which is also distributed under the guise of pirated software).
According to experts, the main malicious module PseudoManuscrypt has many spy functions, including stealing VPN connection data, logging keystrokes, taking screenshots and recordings of screen videos, recording sound from a microphone, stealing data from the clipboard and operating room event log data. systems (which also makes it possible to steal data about RDP connections).
Among the computers that were attacked are many engineering machines, including physical and 3D modeling systems for the development and use of digital twins. This allowed experts to assume that one of the possible targets of the campaign is industrial espionage.
There are also two facts in the company’s report. Una, the PseudoManuscrypt downloader shares similarities with the Manuscrypt malware downloader used by Lazarus in its 2020 attacks against defence companies in various countries. Second, to transfer stolen data to the attackers’ server, PseudoManuscrypt uses an implementation of the rare KCP protocol, which was previously seen only in the malware used by APT41.
Hinuon, the lack of an obvious focus in the distribution of a large number of victims, which is not characteristic of targeted cyber campaigns, does not allow unambiguously linking this campaign with Lazarus or any other APT.
Let me remind you that we also talked about the fact that Researchers discovered ALPHV ransomware written in Rust.