IndigoDrop spreads via military-themed lures to provide Cobalt Strike
By Asheer Malhotra.
- Cisco Talos provides observed a malware marketing campaign that utilizes military-themed malicious Microsoft Workplace documents (maldocs) to distribute Cobalt Hit beacons containing full-fledged RAT features.
- These maldocs use malicious macros to provide a multistage and modular infection highly.
- This campaign seems to target military and government organizations in South Asia.
- Network-centered detection, although important, ought to be coupled with endpoint protections to combat this threat and offer several layers of security.
What’s new?
Cisco Talos has discovered a fresh campaign distributing the multistage strike used to infect focus on endpoints with customized Cobalt Hit beacons. Because of the style of the malicious paperwork (maldocs) employed, it really is highly likely that army and government companies in Southern Asia were focused by this attack.