Malware, Threat Intelligence, Email security

New Sosano malware attacks target UAE

Privacy concept: pixelated words Malware on digital background, 3d render

Aviation, critical transportation infrastructure, and satellite communications firms across the United Arab Emirates have been targeted with the novel Sosano backdoor in highly-targeted attacks by suspected Iranian state-sponsored threat group UNK_Crafty Camel, which leveraged techniques akin to the state-backed TA451 and TA455 hacking operations, according to The Record, a news site by cybersecurity firm Recorded Future.

UNK_Crafty Camel's intrusions commenced with the exploitation of a breached INDIC Electronics email account to facilitate the distribution of malicious emails with links redirecting to a fake website of the Indian electronics company hosting a ZIP archive that enabled Sosano malware delivery, a Proofpoint report showed.

Such an attack campaign "demonstrates the lengths to which state-aligned actors will go to evade detection and fulfill their intelligence collection mandates successfully," said Proofpoint researcher Joshua Miller.

The findings come after TA455, which is believed to be under the Charming Kitten group, was reported to have targeted the aerospace sector through bogus LinkedIn job offers.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds