25 March 2020

New APT campaign targets the Middle East’s industrial sector


New APT campaign targets the Middle East’s industrial sector

A mysterious group of hackers is currently targeting organizations from the Middle East industrial sector, according to a new report from antivirus firm Kaspersky. Dubbed WildPressure, the group, which is described as an APT (advanced persistent threat), employs a never-before-seen backdoor that researchers named Milum, after the C++ class names inside the code.

The WildPressure campaign was discovered in August last year, when researchers detected a previously unknown malware that has no similarities with other samples encountered in previous attacks.

“In August 2019, Kaspersky discovered a malicious campaign distributing a fully fledged C++ Trojan that we call Milum. All the victims we registered were organizations from the Middle East. At least some of them are related to industrial sector. Our Kaspersky Threat Attribution Engine (KTAE) doesn’t show any code similarities with known campaigns. Nor have we seen any target intersections. In fact, we found just three almost unique samples, all in one country. So we consider the attacks to be targeted and have currently named this operation WildPressure,” the researchers said.

Digging further, Kaspersky uncovered other samples of the same malware that infected systems as back as far as May 31, 2019. An analysis of Milum’s code revealed that the backdoor was compiled two months before, in March 2019.

In September 2019, the researchers were able to sinkhole one of the C2 domains used by the APT group (upiserversys1212[.]com). The vast majority of visitor IPs were from the Middle East, specifically from Iran, while the rest were network scanners, TOR exit nodes or VPN connections.

As of yet, the Milum’s spreading mechanism is unknown, and it is still unclear who is behind the campaign.

“Any similarities should be considered weak in terms of attribution, and may simply be techniques copied from previous well-known cases. Indeed, this “learning from more experienced attackers” cycle has been adopted by some interesting new actors in recent years.”

“We should also be cautious regarding the true targeting of this new set of activities, as it is probably too soon to jump to conclusions. The targeted nature seems to be clear, but the targeting itself might be limited by our own visibility. The malware is not exclusively designed against any kind of victim in particular and might be reused in other operations,” Kaspersky researchers noted.


Back to the list

Latest Posts

Cyber Security Week in Review: May 10, 2024

Cyber Security Week in Review: May 10, 2024

In brief: Google fixes yet another Chrome 0Day, Dell suffers a data breach, the LockBit leader identified, and more.
10 May 2024
Massive BogusBazaar fraud ring steals credit cards from thousands of victims

Massive BogusBazaar fraud ring steals credit cards from thousands of victims

As of April 2024, approximately 22,500 domains were active.
9 May 2024
Poland’s government institutions targeted in Russian cyberespionage campaign

Poland’s government institutions targeted in Russian cyberespionage campaign

The incident marks the latest in a string of Russian cyberattacks aimed at NATO-allied nations supporting Ukraine.
9 May 2024