WildPressure APT Hackers Uses New Malware to Attack Both Windows & macOS Operating Systems


The Trojan typically enables the risk stars to obtain remote control of the gadgets that have actually been jeopardized in the attack.

Ever since Kaspersky has been tracking the Milum Trojan, and recently the threat stars have used a more recent variation of this Trojan to attack both Windows and macOS operating systems.

In 2019 Kaspersky had actually detected a destructive trojan called “Milum” that has actually been utilized by the danger stars of WildPressure..

WildPressure has been assaulting Windows for a very long time, thats why this is not the first time when Windows and macOS operating systems are being attacked by such destructive trojan.

According to the report, WildPressure was initially kept in mind in March 2020 based on a malware operation assigning a fully-featured C++ Trojan “Milum”.

Why its known as Milum & & its of interest?

Even the researchers also noted that all these concentration functions are required for C2 communication, however in the case of standalone applications, exportation does not require.

Apart from this, another point is that this malware generally exports great deals of Zlib concentration functions, like zlibVersion(), pump up(), or deflate()..

During an investigation, the professionals brought out some crucial information regarding the attack. According to the analysis, the word milum is used in the C++ class names that exist inside the malware, thus the trojan was called Milum.

Who was assaulted & & whos behind it?

URLsupiserversys1212 [172/page/view. 86/page/view.

Indicators of compromise.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Apart from this the analysis likewise verified that the configuration information and interaction procedure that the malware has utilized in the attack are base64-encoded JSON-formatted setup.

Files MD50C5B15D89FDA9BAF446B286C6F97F53517B1A05FC367E52AADA7BDE07714666BA76991F15D6B4F43FBA419ECA1A8E741Original file names are Milum46_Win32. exe; on the target side they exist as system32.exe.

However, the analysts, yet not confirmed that who lags this attack, but they are attempting their finest to discover each key detail..

Furthermore, the researchers likewise claimed that it is rather tough to discover that who was behind this, as the risk actors have used a very common C++ code.

The Milum trojan has actually initially assaulted the os of Windows and macOS, and it has actually been attacking the system because 2019. After investigating the attack, the professionals kept in mind that a large majority of IPs come from the Middle East.

Not only this, but the experts have likewise noticable that they think that network scanners, TOR exit nodes, or VPN connections likewise came from the Middle East.

URLsupiserversys1212 [] com/rl. php37.59.87 [] 172/page/view. php80.255.3 [] 86/page/view. php.

As the investigation is going the experts are finding the key information, such as the WildPressure also used Python as a programs language for its malware in this attack..

And all the data that has been hijacked were stored in the binarys resource area and it has actually been evaluated with Standard Template Library (STL) functions..

Thats why they stated that they will keep monitoring the malware closely until and unless they do not get all the details.