sb-nz logo
Story image

Unit 42 discovers Komplex trojan targeting OS X systems

27 Sep 2016

The Sofacy Group is still coming up with new trojans, with Unit 42 researchers reporting that an OS X trojan called 'Komplex' is on the scene.

Sofacy, also known as APT28, Pawn Storm, Fancy Bear, and Sednit, have been continuing their operations and expanding their attack toolset.

Trojans with the 'Komplex' tag are being monitored by Palo Alto Networks Autofocus threat intelligence platform and researchers say that the new trojan targets the aerospace industry running OS X.

Researchers say that the Komplex trojan has been used before, in an attack on OS X systems running the MacKeeper antivirus application. The Komplex was delivered as a payload.

The company says that the Komplex trojan is a prime example of how Sofacy is looking more towards multi-platform attacks.

Researchers also say that the trojan is similar to another Sofacy tool - the Carberp variant that been used in attacks on Windows machines.

Komplex command and control (C2) domains were also similar to those used in phishing campaign infrastructures that Sofacy has been known to use.

In addition, the trojan is able to download files, execute and delete files and interact with the system shell.

Palo Alto Networks says that customers using WIldFire are protected, as it identified known Komplex executables as malicious.

For IPS, signature #14442 Sofacy.Gen Command And Control Traffic can detect and block outbound C2 requests generated by the Komplex Trojan.

Customers using AutoFocus can also track the trojan by using the Komplex tag.

Link image
How to head off a rise in DDoS attacks
Many businesses invest in costly DDoS mitigation and protection solutions, but few test them. NCC Group tests all environments and is one of only two AWS DDoS Test Partners. Claim 10% off your next DDoS service today.More
Story image
Acronis expands global data centre network, including new facilities in NZ
The expansion ensures that the full range of Acronis Cyber Protection Solutions will be available to partners and organisations around the world.More
Story image
New project development inhibited by cybersecurity, Kaspersky research states
"There are still some practical steps that can be taken to make sure that an emerging technology or a product reaches its launch. Cybersecurity doesn’t have to be another corporate barrier, but it should be on an integral part of the project all long."More
Story image
IDC survey: Nearly 1/3 of data-ransomed businesses pay up
A Rubrik-commissioned A/NZ survey by IDC finds that despite only 6% saying they would pay ransomware attackers, the reality is quite different.More
Story image
Nokia: Cyber attacks on internet-connected devices on the rise
Cyberattacks on internet-connected devices continue to rise at an alarming rate due to poor security protections.More
Story image
SOC, SIEM, SOAR and SASE define Fortinet’s Security Fabric
Cornelius Mare, Fortinet A/NZ Director, Security Solutions, deciphers the jargon and explains how an alphabet soup of integrated security services spells comprehensive protection for your network and ensures business continuity.More