New TetrisPhantom hackers steal data from secure USB drives on govt systems

A new sophisticated threat tracked as 'TetrisPhantom' has been using compromised secure USB drives to target government systems in the Asia-Pacific region. Secure USB drives store files in an encrypted part of the device and are used to safely transfer data between systems, including those in an air-gapped environment. Access to the protected partition is possible through custom software that decrypts the contents based on a user-provided password. Exe, which is bundled on an unencrypted part of the USB drive. Security researchers discovered trojanized versions of the UTetris application deployed on secure USB devices in an attack campaign that has been running for at least a few years and targeting governments in the APAC region. According to the latest Kaspersky's report on APT trends, TetrisPhantom uses various tools, commands, and malware components that indicate a sophisticated and well-resourced threat group. "The attack comprises sophisticated tools and techniques, including virtualization-based software obfuscation for malware components, low-level communication with the USB drive using direct SCSI commands, self-replication through connected secure USB drives to propagate to other air-gapped systems and injection of code into a legitimate access management program on the USB drive which acts as a loader for the malware on a new machine." - Kaspersky. Kaspersky shared additional details with BleepingComputer, explaining that the attack with the trojanized Utetris app starts with executing on the target machine a payload called AcroShell. AcroShell establishes a communication line with the attacker's command and control server and can fetch and run additional payloads to steal documents and sensitive files, and collect specific details about the USB drives used by the target. The threat actors also use the information gathered this way for research and development of another malware called XMKR and the trojanized UTetris. "The XMKR module is deployed on a Windows machine and is responsible for compromising secure USB drives connected to the system to spread the attack to potentially air-gapped systems" - Kaspersky. XMKR's capabilities on the device include stealing files for espionage purposes and the data is written on the USB drives. The information on the compromised USB is then exfiltrated to the attacker's server when the storage device plugs into an internet-connected computer infected with AcroShell. Kaspersky retrieved and analyzed two malicious Utetris executable variants, one used between September and October 2022 and another deployed in government networks from October 2022 until now. Kaspersky says these attacks have been ongoing for at least a few years now, with espionage being TetrisPhantom's constant focus. The researchers observed a small number of infections on government networks, indicating a targeted operation. Discord still a hotbed of malware activity - Now APTs join the fun. New AtlasCross hackers use American Red Cross as phishing lure. Evasive Gelsemium hackers spotted in attack against Asian govt. Ragnar Locker ransomware developer arrested in France.

This Cyber News was published on www.bleepingcomputer.com. Publication date: Thu, 30 Nov 2023 23:19:27 +0000


Cyber News related to New TetrisPhantom hackers steal data from secure USB drives on govt systems

New TetrisPhantom hackers steal data from secure USB drives on govt systems - A new sophisticated threat tracked as 'TetrisPhantom' has been using compromised secure USB drives to target government systems in the Asia-Pacific region. Secure USB drives store files in an encrypted part of the device and are used to safely ...
2 years ago Bleepingcomputer.com Ragnar Locker
Gamaredon's LittleDrifter USB malware spreads beyond Ukraine - A recently discovered worm that researchers call LittleDrifter has been spreading over USB drives infecting systems in multiple countries as part of a campaign from the Gamaredon state-sponsored espionage group. Malware researchers saw indications of ...
2 years ago Bleepingcomputer.com
Persistent Espionage Campaign Targets APAC Governments - Cybersecurity experts at Kaspersky have unveiled a covert and highly advanced espionage campaign, codenamed "TetrisPhantom." The persistent operation has specifically targeted government institutions in the Asia-Pacific region, utilizing a unique ...
2 years ago Infosecurity-magazine.com
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
1 year ago Aws.amazon.com
CVE-2023-52528 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2024-56769 - In the Linux kernel, the following vulnerability has been resolved: media: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg Syzbot reports [1] an uninitialized value issue found by KMSAN in dib3000_read_reg(). Local u8 rb[2] is used in ...
1 year ago Tenable.com
CVE-2022-49936 - In the Linux kernel, the following vulnerability has been resolved: ...
6 months ago
CVE-2025-38153 - In the Linux kernel, the following vulnerability has been resolved: ...
6 months ago
CVE-2022-50626 - In the Linux kernel, the following vulnerability has been resolved: ...
1 month ago
CVE-2024-41097 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2023-52742 - In the Linux kernel, the following vulnerability has been resolved: net: USB: Fix wrong-direction WARNING in plusb.c The syzbot fuzzer detected a bug in the plusb network driver: A zero-length control-OUT transfer was treated as a read instead of a ...
1 year ago Tenable.com
CVE-2025-38376 - In the Linux kernel, the following vulnerability has been resolved: ...
5 months ago
CVE-2025-40189 - In the Linux kernel, the following vulnerability has been resolved: ...
2 months ago
CVE-2025-21916 - In the Linux kernel, the following vulnerability has been resolved: ...
9 months ago
Optimizing Cybersecurity: How Hackers Use Golang Source Code Interpreter to Evade Detection - Hackers have been upping the stakes when it comes to executing cyberattacks, and an increasingly popular tool in their arsenal is the Golang source code interpreter. Reportedly, the interpreter is used to obfuscate code, thus making it harder for ...
2 years ago Bleepingcomputer.com
CVE-2024-38565 - In the Linux kernel, the following vulnerability has been resolved: wifi: ar5523: enable proper endpoint verification Syzkaller reports [1] hitting a warning about an endpoint in use not having an expected type to it. Fix the issue by checking for ...
1 year ago Tenable.com
Linux USB Audio Driver Vulnerability Actively Exploited in the Wild Via Malicious USB - The USB-audio driver in the Linux kernel has an out-of-bounds access vulnerability that possibly enables an attacker with physical access to the system to use a malicious USB device to escalate privileges, modify system memory, or run arbitrary code. ...
9 months ago Cybersecuritynews.com
Google: Hackers exploited Zimbra zero-day in attacks on govt orgs - Google's Threat Analysis Group has discovered that threat actors exploited a zero-day vulnerability in Zimbra Collaboration email server to steal sensitive data from government systems in multiple countries. Hackers leveraged a medium-severity ...
2 years ago Bleepingcomputer.com CVE-2023-37580 CVE-2022-24682 CVE-2023-5631
Boost Your Computer Security: How PlugX Malware Hides On USB Devices - In recent weeks, a malicious piece of malware called PlugX has been detected on USB thumb drives. This malware hides itself on USB devices, so that when a new Windows-hosts is plugged into the device, it can infect the host. This makes PlugX a ...
2 years ago Bleepingcomputer.com
Secure Workload and Secure Firewall: The recipe for a robust zero trust cybersecurity strategy - You hear a lot about zero trust microsegmentation these days and rightly so. While a host-based enforcement approach is immensely powerful because it provides access to rich telemetry in terms of processes, packages, and CVEs running on the ...
2 years ago Feedpress.me
How Hackers Interrupted GTA 5 Online Gameplay on PC - Recently, a cyber-attack on Grand Theft Auto 5 Online on PC caused an interruption to thousands of players’ gameplays. The game was completely taken offline and players couldn’t even access the main gameplay menu. The attack caused an uproar ...
2 years ago Hackread.com
Holiday Hackers: How to Safeguard Your Service Desk - Hackers really don't take holidays, but they will take advantage of them. Many of these cyberattacks will zero in on the service or help desk to gain entry into network systems. Recovering accounts because of forgotten passwords is one of the ...
2 years ago Bleepingcomputer.com
Zero Trust Security: How to Secure Critical Infrastructure - Zero trust security is a critical component of any organization's security strategy that enables organizations to protect their data and systems from malicious actors, cyber threats, and unauthorized access. With the ever-evolving cyber threats ...
2 years ago Csoonline.com
CVE-2023-54213 - In the Linux kernel, the following vulnerability has been resolved: ...
2 weeks ago
CVE-2021-47472 - In the Linux kernel, the following vulnerability has been resolved: net: mdiobus: Fix memory leak in __mdiobus_register Once device_register() failed, we should call put_device() to decrement reference count for cleanup. Or it will cause memory leak. ...
1 year ago Tenable.com