Summary

  • Unit 42 researchers have been monitoring a series of attacks targeting financial organizations across Africa.
  • The attackers use a consistent playbook, combining open-source and publicly available tools including PoshC2, Chisel and Classroom Spy.
  • These tools are disguised as legitimate products, with the threat actor copying signatures from legitimate applications and abusing trusted sites for malware delivery.
  • The threat actor signatures and domains have been added to our threat intelligence feeds.
  • These findings have been shared with our fellow Cyber Threat Alliance members, meaning protections can be rapidly deployed to customer environments, and malicious cyber actors disrupted.

By Tom Fakterman and Guy Levi

Original Article