WildPressure APT Hackers Uses New Malware to Attack Both Windows & macOS Operating Systems


In 2019 Kaspersky had actually discovered a destructive trojan named “Milum” that has been used by the threat actors of WildPressure..

The Trojan usually allows the threat stars to acquire push-button control of the gadgets that have been jeopardized in the attack.

Ever since Kaspersky has been tracking the Milum Trojan, and recently the threat actors have utilized a newer version of this Trojan to assault both Windows and macOS running systems.

According to the report, WildPressure was at first noted in March 2020 based upon a malware operation designating a fully-featured C++ Trojan “Milum”.

WildPressure has been assaulting Windows for a very long time, thats why this is not the very first time when Windows and macOS operating systems are being attacked by such destructive trojan.

Why its referred to as Milum & & its of interest?

Apart from this, another point is that this malware typically exports great deals of Zlib concentration functions, like zlibVersion(), inflate(), or deflate()..

During an investigation, the professionals brought out some key details regarding the attack. According to the analysis, the word milum is applied in the C++ class names that exist inside the malware, thus the trojan was called Milum.

Even the scientists also kept in mind that all these concentration functions are needed for C2 communication, but in the case of standalone applications, exportation does not require.

Who was attacked & & whos behind it?

The Milum trojan has actually initially assaulted the operating system of Windows and macOS, and it has actually been attacking the system since 2019. After examining the attack, the specialists noted that a large majority of IPs come from the Middle East.

Apart from this the analysis also affirmed that the setup data and communication procedure that the malware has used in the attack are base64-encoded JSON-formatted setup.

Thats why they stated that they will keep monitoring the malware closely till and unless they do not get all the information.

As the examination is going the specialists are finding the key details, such as the WildPressure likewise utilized Python as a shows language for its malware in this attack..

URLsupiserversys1212 [] com/rl. php37.59.87 [] 172/page/view. php80.255.3 [] 86/page/view. php.

Nevertheless, the experts, yet not confirmed that who lags this attack, however they are trying their best to discover each crucial detail..

Indicators of compromise.

Additionally, the scientists likewise declared that it is quite challenging to discover that who was behind this, as the risk actors have actually utilized an extremely typical C++ code.

Not just this, however the professionals have likewise noticable that they think that network scanners, TOR exit nodes, or VPN connections likewise came from the Middle East.

URLsupiserversys1212 [172/page/view. 86/page/view.

And all the information that has been hijacked were kept in the binarys resource section and it has been examined with Standard Template Library (STL) functions..

Files MD50C5B15D89FDA9BAF446B286C6F97F53517B1A05FC367E52AADA7BDE07714666BA76991F15D6B4F43FBA419ECA1A8E741Original file names are Milum46_Win32. exe; on the target side they exist as system32.exe.

You can follow us on Linkedin, Twitter, Facebook for day-to-day Cybersecurity and hacking news updates.