{"id":1433,"date":"2023-09-08T02:37:19","date_gmt":"2023-09-08T02:37:19","guid":{"rendered":"https:\/\/cyberthreatintelligencenetwork.com\/?p=1433"},"modified":"2024-06-10T23:35:17","modified_gmt":"2024-06-10T23:35:17","slug":"potential-new-evilnum-campaign","status":"publish","type":"post","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/08\/potential-new-evilnum-campaign\/","title":{"rendered":"Potential New EvilNum Campaign"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1433\" class=\"elementor elementor-1433\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-56c634a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"56c634a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1cc63ac\" data-id=\"1cc63ac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-02a6ba5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"02a6ba5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-210229d\" data-id=\"210229d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c5db6b5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c5db6b5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f12c6b9\" data-id=\"f12c6b9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-00c87f7 e-flex e-con-boxed e-con e-parent\" data-id=\"00c87f7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cf730ab elementor-widget elementor-widget-text-editor\" data-id=\"cf730ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>CTIN has discovered a new campaign that appears to be associated with previous malicious infrastructure attributed to Evilnum. EvilNum is an advanced persistent threat (APT) group that is characterized by an evolving toolkit and sector-specific and geographic-specific targeting. ESET performed an in-depth technical analysis on observations they made between 2018 and 2020. <a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/08\/potential-new-evilnum-campaign\/#_ftn1\" name=\"_ftnref1\">[1]<\/a> \u00a0More recently CyberReason has described one of their newest tools called PyVil Remote Access Trojan (RAT).<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/08\/potential-new-evilnum-campaign\/#_ftn2\" name=\"_ftnref2\">[2]<\/a> \u00a0This is a RAT written in the popular Python programming language.\u00a0 And, as the reader will see in my subsequent analysis, this new campaign appears to be using a compiled version of Python modules (with the .pyd extension).\u00a0 Based on the targeting patterns and the technical analyses from previous researchers we hypothesize that the artifacts we have surfaced provide evidence of a new and currently active EvilNum campaign.\u00a0<\/p><p>Based on the current evidence EvilNum is focusing on specific targets in the financial services sector in EU countries and the UK. They are particularly interested in banking and financial technology companies and are taking advantage of Know Your Customers (KYC) rules that require these companies to collect personally identifying information (PII) from their customers.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5517139 e-flex e-con-boxed e-con e-parent\" data-id=\"5517139\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-516b4b3 e-con-full e-flex e-con e-child\" data-id=\"516b4b3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c86ac39 elementor-widget elementor-widget-heading\" data-id=\"c86ac39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Targeting<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1480d08 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1480d08\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-025f5be\" data-id=\"025f5be\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-98337ca elementor-widget elementor-widget-text-editor\" data-id=\"98337ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In their past campaigns high value targets like customer service representatives and KYC screeners at leading banks and financial institutions are targeted through carefully crafted phishing emails that include a link to a downloadable file. This file appears as a bundle of shortcuts that, when opened, secretly run harmful software in the background while also showing a fake document to distract the user. To further deceive the user, shortcut files are named in a way that makes them look like harmless documents or images. This trick is especially effective on Windows computers, where the type of file is usually not shown, making it easier for the user to be fooled into opening it.<\/p><p>In the current campaign we have not been able to corroborate this method of social engineering. However, through our hunting using network artifacts on threats to upcoming EU-related elections we identified some cyber observables that led us to artifacts that have been associated with past EvilNum campaigns.\u00a0 What we uncovered was an IPv4 and an IPv6 address that resolved to a RU domain name that embedded the word \u2018android\u2019. The IPs of interest are:<\/p><ul><li>172.67.183[.]146<\/li><li>2606:4700:3033::ac43[:]b792<\/li><\/ul><p>The use of the word \u2018android\u2019 led us to surmise that the phishing campaign was 1) targeting android users, or 2) launched from android devices through an extensive affiliate network.\u00a0<\/p><p>The IPs in question that led us to the domain of interest are registered to Cloudflare.\u00a0 Most reputable US and European companies, like Cloudflare, work closely with law enforcement once malicious activity has been discovered on their infrastructure.\u00a0 In fact, just this week the world witnessed a major global takedown of one of the most egregious botnets by international law enforcement cooperation (along with private sector companies who were owner\/operators of the underlying infrastructure).<a href=\"#_ftn1\" name=\"_ftnref1\">[3]<\/a> We hope that this report will also interest Cloudflare security researchers which will result in remedial action.<\/p><p>Following is a summary of some of the hunt artifacts that led us to hypothesize that this is a new EvilNum campaign.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-ce6cba8 e-flex e-con-boxed e-con e-parent\" data-id=\"ce6cba8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-649a9f2 e-con-full e-flex e-con e-child\" data-id=\"649a9f2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-512081f elementor-widget elementor-widget-heading\" data-id=\"512081f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">SkaCHAT Campaign<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d79affc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d79affc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c73cb9d\" data-id=\"c73cb9d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-84f3d47 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"84f3d47\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e385d63\" data-id=\"e385d63\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-56a1fc8 elementor-widget elementor-widget-image\" data-id=\"56a1fc8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"448\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/RU-Address-768x537.png\" class=\"attachment-medium_large size-medium_large wp-image-1457 lazyload\" alt=\"\" data-srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/RU-Address-768x537.png 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/RU-Address-300x210.png 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/RU-Address.png 918w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><noscript><img decoding=\"async\" width=\"640\" height=\"448\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/RU-Address-768x537.png\" class=\"attachment-medium_large size-medium_large wp-image-1457 lazyload\" alt=\"\" srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/RU-Address-768x537.png 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/RU-Address-300x210.png 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/RU-Address.png 918w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/noscript>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a942fdc\" data-id=\"a942fdc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2147f03 elementor-widget elementor-widget-text-editor\" data-id=\"2147f03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>From the 172.67.183[.]146 IP we further investigated the suspicious-looking Russian TLD domain name:\u00a0\u00a0 skachat-1-xbet-na-android[.]ru. Note that the subject domain was last seen on current DNS servers Sept. 2, 2023. \u00a0A screenshot of the landing page of the website is given here.<\/p><p>Upon further investigation of the functioning of this site we found evidence of a widespread phishing campaign associated with our subject cyber observables that appeared to be administered from https:\/\/ mail.sandiegofenceinstallers.com. Redirect strings were embedded in phishing lures that exposed vulnerable hosts to infection.\u00a0<\/p><p>Each redirect string embedded the name or names of financial institutions as shown on the example image below.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-239d186 e-flex e-con-boxed e-con e-parent\" data-id=\"239d186\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9be37e4 e-con-full e-flex e-con e-child\" data-id=\"9be37e4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c63ff4f elementor-widget elementor-widget-image\" data-id=\"c63ff4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"176\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/Installers-RedirectingtoSchwab-768x211.png\" class=\"attachment-medium_large size-medium_large wp-image-1458 lazyload\" alt=\"\" data-srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/Installers-RedirectingtoSchwab-768x211.png 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/Installers-RedirectingtoSchwab-300x82.png 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/Installers-RedirectingtoSchwab.png 775w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><noscript><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"176\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/Installers-RedirectingtoSchwab-768x211.png\" class=\"attachment-medium_large size-medium_large wp-image-1458 lazyload\" alt=\"\" srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/Installers-RedirectingtoSchwab-768x211.png 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/Installers-RedirectingtoSchwab-300x82.png 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/Installers-RedirectingtoSchwab.png 775w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/noscript>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bd3f551 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bd3f551\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2616a51\" data-id=\"2616a51\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-004dc6b elementor-widget elementor-widget-text-editor\" data-id=\"004dc6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The URL string in the figure above was embedded in a benign chrome executable bundle for a Chrome update. A Joe Sandbox analysis of the redirect string is provided at the following URL:\u00a0 <a href=\"https:\/\/www.joesandbox.com\/analysis\/1296925\">https:\/\/www.joesandbox.com\/analysis\/1296925<\/a>.<\/p><p>The following flow diagram is a screenshot of the behavioral analysis.\u00a0 As the reader will note from the flow diagram the heat bar for the Google files and IP addresses are benign, whereas the rating for the string we submitted for analysis is flagged as Malicious.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-55189e6 e-flex e-con-boxed e-con e-parent\" data-id=\"55189e6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-efb871b e-con-full e-flex e-con e-child\" data-id=\"efb871b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8f38186 elementor-widget elementor-widget-image\" data-id=\"8f38186\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"751\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/BehaviorGraph-PL_MailServerString-768x901.png\" class=\"attachment-medium_large size-medium_large wp-image-1466 lazyload\" alt=\"\" data-srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/BehaviorGraph-PL_MailServerString-768x901.png 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/BehaviorGraph-PL_MailServerString-256x300.png 256w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/BehaviorGraph-PL_MailServerString.png 796w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><noscript><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"751\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/BehaviorGraph-PL_MailServerString-768x901.png\" class=\"attachment-medium_large size-medium_large wp-image-1466 lazyload\" alt=\"\" srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/BehaviorGraph-PL_MailServerString-768x901.png 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/BehaviorGraph-PL_MailServerString-256x300.png 256w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/BehaviorGraph-PL_MailServerString.png 796w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/noscript>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8877874 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8877874\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0159432\" data-id=\"0159432\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-93f659e e-flex e-con-boxed e-con e-parent\" data-id=\"93f659e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e2c29df e-con-full e-flex e-con e-child\" data-id=\"e2c29df\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-20eb6f1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"20eb6f1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-afece31\" data-id=\"afece31\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-148c6b2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"148c6b2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-inner-column elementor-element elementor-element-c35a4bf\" data-id=\"c35a4bf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-efb8a4b elementor-widget elementor-widget-image\" data-id=\"efb8a4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"284\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/SearchQuery-768x341.png\" class=\"attachment-medium_large size-medium_large wp-image-1467 lazyload\" alt=\"\" data-srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/SearchQuery-768x341.png 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/SearchQuery-300x133.png 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/SearchQuery-1024x455.png 1024w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/SearchQuery.png 1069w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><noscript><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"284\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/SearchQuery-768x341.png\" class=\"attachment-medium_large size-medium_large wp-image-1467 lazyload\" alt=\"\" srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/SearchQuery-768x341.png 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/SearchQuery-300x133.png 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/SearchQuery-1024x455.png 1024w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/SearchQuery.png 1069w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/noscript>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-854ce6a\" data-id=\"854ce6a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7ea02d1 elementor-widget elementor-widget-text-editor\" data-id=\"7ea02d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The JoeSandbox analysis run was performed on August 24 at 19:54:39 +02:00 UTC.\u00a0 A summary of the impact on Windows systems includes:<\/p><ul><li>injects,<\/li><li>writes to registry keys,<\/li><li>drops of process executable files,<\/li><li>multi-threaded processing,<\/li><li>email attachment and disassembly.<\/li><\/ul><p>There were also numerous Android and Common behaviors that were identified by the analysis as summarized on the above figure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-03c21be e-flex e-con-boxed e-con e-parent\" data-id=\"03c21be\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f462bde e-con-full e-flex e-con e-child\" data-id=\"f462bde\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-901d70c elementor-widget elementor-widget-text-editor\" data-id=\"901d70c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A VirusTotal hunt on that MD5 hash takes us to a Chrome executable file that shows up Clean as of August 29, 2023 23:35:36 UTC\u00a0\u00a0 (<a href=\"https:\/\/www.virustotal.com\/gui\/file\/435ef71c00333bddecf5b30c491327b573461051baa9d6b71063d79783589fa9\/detection\">https:\/\/www.virustotal.com\/gui\/file\/435ef71c00333bddecf5b30c491327b573461051baa9d6b71063d79783589fa9\/detection<\/a>). This is as we would expect, given the results of the JoeSandbox analysis.<\/p><p>\u00a0However, there were Community Collections showing relationships with an underlying malicious infrastructure. We explored some of the findings of these Community Collections and surfaced more artifacts using the Graph analysis capabilities of VirusTotal.\u00a0\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-499293f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"499293f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b63dc5a\" data-id=\"b63dc5a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9e2012f elementor-widget elementor-widget-image\" data-id=\"9e2012f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"370\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/EU-Elections-PY-RAT-1024x592.png\" class=\"attachment-large size-large wp-image-1477 lazyload\" alt=\"\" data-srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/EU-Elections-PY-RAT-1024x592.png 1024w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/EU-Elections-PY-RAT-300x173.png 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/EU-Elections-PY-RAT-768x444.png 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/EU-Elections-PY-RAT-1536x887.png 1536w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/EU-Elections-PY-RAT.png 1570w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><noscript><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"370\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/EU-Elections-PY-RAT-1024x592.png\" class=\"attachment-large size-large wp-image-1477 lazyload\" alt=\"\" srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/EU-Elections-PY-RAT-1024x592.png 1024w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/EU-Elections-PY-RAT-300x173.png 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/EU-Elections-PY-RAT-768x444.png 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/EU-Elections-PY-RAT-1536x887.png 1536w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/EU-Elections-PY-RAT.png 1570w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/noscript>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-02bd207 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"02bd207\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c58b8cf\" data-id=\"c58b8cf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9de2de1 elementor-widget elementor-widget-text-editor\" data-id=\"9de2de1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>On the bottom right of the figure is a cluster of very current .dll files that are designed to perform actions that load or execute .pyd files as part of an attack chain. A .dll file cannot &#8220;contain&#8221; a .pyd file in the sense of embedding it within its binary structure, as both are standalone compiled binaries.<\/p><p>The .pyd file extension represents a Python Dynamic Module. These are analogous to dynamic link libraries (DLLs) on Windows or shared objects (.so) on Linux and Unix systems. A .pyd file is basically a DLL but is loaded like a regular Python module. It can contain compiled C or C++ code and is generally used to extend the capabilities of Python by allowing the integration of functions written in languages like C and C++.<\/p><p>When you import a .pyd file in Python, the Python interpreter treats it just like a regular Python module, but the actual code execution happens in the compiled code contained within the .pyd file. This approach is often used for performance optimization or for integrating Python with libraries written in other programming languages.<\/p><p>In a cybersecurity context, .pyd files could potentially be scrutinized during threat hunting activities. Since they can contain compiled code, they have the capacity to perform actions that could be malicious, similar to other forms of compiled code like DLLs or executables.<\/p><p>However, a .dll file can be designed to interact with a .pyd file, and vice versa, if they are programmed to do so. For example, a Python program using ctypes or pybind11 could load both .dll and .pyd files and facilitate interaction between them, allowing for a kind of functional relationship even if one does not contain the other.\u00a0<\/p><p>As can be seen on the above figure, the .dll files that load the .pyd files have been packed by a py Installer file called CertReq[.]exe, last seen Aug. 2, 2023, visible at the bottom left.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f9cf9a2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f9cf9a2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-89abb76\" data-id=\"89abb76\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cbad6a7 elementor-widget elementor-widget-text-editor\" data-id=\"cbad6a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The above graph image can be accessed live at:\u00a0<\/p><p><a href=\"https:\/\/www.virustotal.com\/graph\/embed\/gfa9d9c7a077b42ea8d8465d56034a5b92f3a7864dbc148a5938a346009339480?theme=light\">https:\/\/www.virustotal.com\/graph\/embed\/gfa9d9c7a077b42ea8d8465d56034a5b92f3a7864dbc148a5938a346009339480?theme=light<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cca3928 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cca3928\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-83c9ae7\" data-id=\"83c9ae7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7f36a6d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7f36a6d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f897fa2\" data-id=\"f897fa2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7892059 elementor-widget elementor-widget-text-editor\" data-id=\"7892059\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At this juncture it should be noted that the \u2018sandiegofenceinstallers[.]com\u2019 domain that was embedded in the phishing campaign was what led us to these artifacts.\u00a0 This domain currently presents as \u2018clean\u2019 on VirusTotal (as of August 29, 2023).\u00a0 The WHOIS information indicates that it is owned by Alibaba as of April 10, 2023, as shown on the adjacent figure. The embedded redirect string we discussed above is not being picked up by traditional antivirus signature-based solutions.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7e29e44\" data-id=\"7e29e44\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-23060f4 elementor-widget elementor-widget-image\" data-id=\"23060f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/AlibabaOwner.png\" title=\"\" alt=\"\" loading=\"lazy\" \/><noscript><img decoding=\"async\" class=\"lazyload\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/AlibabaOwner.png\" title=\"\" alt=\"\" loading=\"lazy\" \/><\/noscript>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fb11c6d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fb11c6d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-43ed0bd\" data-id=\"43ed0bd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4eac31b elementor-widget elementor-widget-text-editor\" data-id=\"4eac31b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Sample domains\u00a0 embedded in the strings are given below:<\/p><ul><li>accountmanagepymnt.myvnc.com<\/li><li>summarypaymentsacc.myftp.org<\/li><li>manageaccountpaymnt.myftp.org<\/li><li>info6547makingreal.ddns.net<\/li><li>paypalsemewq.servebeer.com<\/li><li>limitedppmanageaccountous.forumz.info<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1929dce elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1929dce\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5192de9\" data-id=\"5192de9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-36f86ca elementor-widget elementor-widget-text-editor\" data-id=\"36f86ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The specific activity associated with the malware discovered in this has not been confirmed as the PyVil RAT as analyzed by CyberReason.\u00a0 However, the evidence discovered suggests that the current campaign may be an extension of previous activity targeting financial services with some of EvilNum\u2019s newest tools.\u00a0<\/p><p>When applying our findings regarding the &#8216;sandiegofenceinstallers[.]com&#8217; domain to the MITRE ATT&amp;CK Matrix, the specific tactics, techniques and procedures (TTPs) of the malicious redirect code and subsequent infection chains can be surfaced.\u00a0\u00a0<\/p><p>The specific TTPs are given in the figure below.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc4d5d4 elementor-widget elementor-widget-image\" data-id=\"dc4d5d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"306\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/ATTACK-matrix-1024x490.png\" class=\"attachment-large size-large wp-image-1498 lazyload\" alt=\"\" data-srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/ATTACK-matrix-1024x490.png 1024w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/ATTACK-matrix-300x143.png 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/ATTACK-matrix-768x367.png 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/ATTACK-matrix-1536x735.png 1536w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/ATTACK-matrix.png 1633w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><noscript><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"306\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/ATTACK-matrix-1024x490.png\" class=\"attachment-large size-large wp-image-1498 lazyload\" alt=\"\" srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/ATTACK-matrix-1024x490.png 1024w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/ATTACK-matrix-300x143.png 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/ATTACK-matrix-768x367.png 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/ATTACK-matrix-1536x735.png 1536w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/ATTACK-matrix.png 1633w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/noscript>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-060a6cd e-flex e-con-boxed e-con e-parent\" data-id=\"060a6cd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f99391d e-con-full e-flex e-con e-child\" data-id=\"f99391d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-47b2f17 elementor-widget elementor-widget-heading\" data-id=\"47b2f17\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Conclusions<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2c2824a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2c2824a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a0b6a41\" data-id=\"a0b6a41\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d1b228a elementor-widget elementor-widget-text-editor\" data-id=\"d1b228a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Evilnum is a recognized threat actor group that has been active since 2018. Multiple technical analyses have been published outlining their advanced TTPs and targeting patterns. This article adds to that knowledge base by revealing the finding of our research in late summer, early fall of 2023, a pivotal time in the geopolitical context.<\/p><p>Based on our evidence to date our test of the alternative hypotheses about the use of, or targeting of, android hosts would lead us to conclude that the latter was the case.\u00a0 This is based on the findings from the JoeSandbox analysis that illustrated specific functions that were surfaced during the behaviorial analysis.\u00a0<\/p><p>We were also able to surface a domain that appeared to be a key domain for distribution of strings spreading the phishing campaign (sandiegofenceinstallers[.]com). We are characterizing this as a C2 Phishing domain. We also saw that this domain was injected onto legitimate updates of the Chrome web browser.\u00a0\u00a0<\/p><p>Furthermore, we have documented the files that have been most active in the spread of a Python module.\u00a0 All of the modules identified have been active since July, 2023.\u00a0 We cannot corroborate the use of the PyVil RAT as described by CyberReason, but we can assert that the threat actor appears to be using a Python-based infrastructure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-ef04393 e-flex e-con-boxed e-con e-parent\" data-id=\"ef04393\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ca6ae53 e-con-full e-flex e-con e-child\" data-id=\"ca6ae53\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4aa0f0d elementor-widget elementor-widget-text-editor\" data-id=\"4aa0f0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>References:<\/strong><\/p><p><a href=\"#_ftnref1\">[1]<\/a> <a href=\"https:\/\/www.welivesecurity.com\/2020\/07\/09\/more-evil-deep-look-evilnum-toolset\/\">https:\/\/www.welivesecurity.com\/2020\/07\/09\/more-evil-deep-look-evilnum-toolset\/<\/a>\u00a0<\/p><p><a href=\"#_ftnref2\">[2]<\/a> <a href=\"https:\/\/www.cybereason.com\/blog\/research\/no-rest-for-the-wicked-evilnum-unleashes-pyvil-rat\">https:\/\/www.cybereason.com\/blog\/research\/no-rest-for-the-wicked-evilnum-unleashes-pyvil-rat<\/a><\/p><p><a href=\"#_ftnref1\">[3]<\/a> <a href=\"https:\/\/www.justice.gov\/usao-cdca\/pr\/qakbot-malware-disrupted-international-cyber-takedown\">https:\/\/www.justice.gov\/usao-cdca\/pr\/qakbot-malware-disrupted-international-cyber-takedown<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4080886 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4080886\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-01865b5\" data-id=\"01865b5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e62c83f elementor-widget elementor-widget-text-editor\" data-id=\"e62c83f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Indicators of Compromise (IOCs)<\/strong><\/p><p style=\"padding-left: 40px;\">IP Addresses:<\/p><ul><li style=\"list-style-type: none;\"><ul><li>172.67.183[.]146<\/li><li>2606:4700:3033::ac43[:]b792<\/li><\/ul><\/li><\/ul><p style=\"padding-left: 40px;\">C2 Phishing Domain:<\/p><p style=\"padding-left: 80px;\">sandiegofenceinstallers[.]com<\/p><p style=\"padding-left: 40px;\">.pyd Installer File:<\/p><p style=\"padding-left: 80px;\">CertReq[.]exe<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-1e19293 e-flex e-con-boxed e-con e-parent\" data-id=\"1e19293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-48bbfa3 e-con-full e-flex e-con e-child\" data-id=\"48bbfa3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9ec0a39 elementor-widget elementor-widget-text-editor\" data-id=\"9ec0a39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Indicators of Compromise (IOCs)<\/strong><\/p><p style=\"padding-left: 40px;\">IP Addresses:<\/p><ul><li style=\"list-style-type: none;\"><ul><li>172.67.183[.]146<\/li><li>2606:4700:3033::ac43[:]b792<\/li><\/ul><\/li><\/ul><p style=\"padding-left: 40px;\">C2 Phishing Domain:<\/p><p style=\"padding-left: 80px;\">sandiegofenceinstallers[.]com<\/p><p style=\"padding-left: 40px;\">.pyd Installer File:<\/p><p style=\"padding-left: 80px;\">CertReq[.]exe<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6d0fa39 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6d0fa39\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-44118d3\" data-id=\"44118d3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f10d7c8 elementor-widget elementor-widget-text-editor\" data-id=\"f10d7c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>Editors Note:\u00a0 The Sigma Signature below was published as OSINT to the VirusTotal platform.\u00a0 Credit goes to the author: Ariel Millahuel.\u00a0 The MITRE ATT&amp;CK TTPs cited here are for the PyVil RAT, not for the sandiegofenceinstallers[.]com domain as shown above.\u00a0<\/em>\u00a0<\/p><p><strong>Sigma Rule \u2013 Pyvil RAT<\/strong><\/p><p style=\"padding-left: 40px;\">action: global<br \/>title: Pyvil RAT<br \/>status: stable<\/p><p style=\"padding-left: 40px;\">description: Pyvil its a new RAT that belongs to the Evilnum group. This one was highly investigated by the Cybereason&#8217;s Nocturnus Team. Also, its important to say tha this is a python-scripted RAT.<\/p><p style=\"padding-left: 40px;\">references:<br \/>&#8211; https:\/\/tdm.socprime.com\/tdm\/info\/YgyDYAROBUOq<br \/>&#8211; https:\/\/www.cybereason.com\/blog\/no-rest-for-the-wicked-evilnum-unleashes-pyvil-rat<br \/>&#8211; https:\/\/attack.mitre.org\/techniques\/T1566\/002\/<br \/>&#8211; https:\/\/attack.mitre.org\/techniques\/T1566<br \/>&#8211; https:\/\/attack.mitre.org\/techniques\/T1059\/003\/<br \/>&#8211; https:\/\/attack.mitre.org\/techniques\/T1059<br \/>&#8211; https:\/\/attack.mitre.org\/techniques\/T1027\/<\/p><p style=\"padding-left: 40px;\">tags:<br \/>&#8211; attack.defense_evasion<br \/>&#8211; attack.execution<br \/>&#8211; attack.t1566<br \/>&#8211; attack.t1059<br \/>&#8211; attack.t1059.003<br \/>&#8211; attack.t1027<\/p><p style=\"padding-left: 40px;\">author: Ariel Millahuel<\/p><p style=\"padding-left: 40px;\">detection:<\/p><p style=\"padding-left: 80px;\">\u00a0 condition: 1 of them<\/p><p style=\"padding-left: 40px;\">fields:<\/p><p style=\"padding-left: 80px;\">&#8211; EventID<br \/>&#8211; CommandLine<br \/>&#8211; TargetFilename<\/p><p style=\"padding-left: 40px;\">falsepositives:<\/p><p style=\"padding-left: 80px;\">&#8211; none<\/p><p style=\"padding-left: 40px;\">level: critical<\/p><p style=\"padding-left: 40px;\">&#8212;<\/p><p style=\"padding-left: 40px;\">logsource:<\/p><p style=\"padding-left: 80px;\">product: windows<br \/>service: sysmon<\/p><p style=\"padding-left: 40px;\">detection:<\/p><p style=\"padding-left: 40px;\">\u00a0 selection1:<\/p><p style=\"padding-left: 40px;\">\u00a0\u00a0\u00a0 EventID: 11<\/p><p style=\"padding-left: 40px;\">\u00a0\u00a0\u00a0 TargetFilename|contains:<br \/>\u00a0 \u00a0&#8211; PersonalKYC.pdf.lnk<br \/>\u00a0&#8211; 1.lnk<br \/>&#8211; \\Microsoft\\Credentials\\MediaPlayer\\ddpp.exe<br \/>&#8211; \\microsoft\\media player\\player\\fplayer.exe<\/p><p style=\"padding-left: 40px;\">&#8212;<\/p><p style=\"padding-left: 40px;\">logsource:<\/p><p style=\"padding-left: 80px;\">category: process_creation<br \/>product: windows<\/p><p style=\"padding-left: 40px;\">detection:<\/p><p style=\"padding-left: 40px;\">\u00a0 selection2:<\/p><p style=\"padding-left: 40px;\">\u00a0\u00a0\u00a0 CommandLine:<\/p><p style=\"padding-left: 40px;\">\u00a0\u00a0\u00a0 &#8211; cmd.exe \/c path=%windir%\\system32&amp;move &#8220;PersonalKYC.pdf.lnk&#8221; &#8220;%tmp%\\1.lnk&#8221;&amp;type &#8220;%tmp\\1.lnk&#8221; |find &#8220;END2&#8221;&gt;&#8221;%tmp%\\0.js&#8221;&amp;wscript &#8220;%tmp%\\0.js&#8221;Mul<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-c083d82 e-flex e-con-boxed e-con e-parent\" data-id=\"c083d82\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b9adb5c e-con-full e-flex e-con e-child\" data-id=\"b9adb5c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ba3bac elementor-widget elementor-widget-text-editor\" data-id=\"1ba3bac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>Editors Note:\u00a0 The Sigma Signature below was published as OSINT to the VirusTotal platform.\u00a0 Credit goes to the author: Ariel Millahuel.\u00a0 The MITRE ATT&amp;CK TTPs cited here are for the PyVil RAT, not for the sandiegofenceinstallers[.]com domain as shown above.\u00a0<\/em>\u00a0<\/p><p><strong>Sigma Rule \u2013 Pyvil RAT<\/strong><\/p><p style=\"padding-left: 40px;\">action: global<br \/>title: Pyvil RAT<br \/>status: stable<\/p><p style=\"padding-left: 40px;\">description: Pyvil its a new RAT that belongs to the Evilnum group. This one was highly investigated by the Cybereason&#8217;s Nocturnus Team. Also, its important to say tha this is a python-scripted RAT.<\/p><p style=\"padding-left: 40px;\">references:<br \/>&#8211; https:\/\/tdm.socprime.com\/tdm\/info\/YgyDYAROBUOq<br \/>&#8211; https:\/\/www.cybereason.com\/blog\/no-rest-for-the-wicked-evilnum-unleashes-pyvil-rat<br \/>&#8211; https:\/\/attack.mitre.org\/techniques\/T1566\/002\/<br \/>&#8211; https:\/\/attack.mitre.org\/techniques\/T1566<br \/>&#8211; https:\/\/attack.mitre.org\/techniques\/T1059\/003\/<br \/>&#8211; https:\/\/attack.mitre.org\/techniques\/T1059<br \/>&#8211; https:\/\/attack.mitre.org\/techniques\/T1027\/<\/p><p style=\"padding-left: 40px;\">tags:<br \/>&#8211; attack.defense_evasion<br \/>&#8211; attack.execution<br \/>&#8211; attack.t1566<br \/>&#8211; attack.t1059<br \/>&#8211; attack.t1059.003<br \/>&#8211; attack.t1027<\/p><p style=\"padding-left: 40px;\">author: Ariel Millahuel<\/p><p style=\"padding-left: 40px;\">detection:<\/p><p style=\"padding-left: 80px;\">\u00a0 condition: 1 of them<\/p><p style=\"padding-left: 40px;\">fields:<\/p><p style=\"padding-left: 80px;\">&#8211; EventID<br \/>&#8211; CommandLine<br \/>&#8211; TargetFilename<\/p><p style=\"padding-left: 40px;\">falsepositives:<\/p><p style=\"padding-left: 80px;\">&#8211; none<\/p><p style=\"padding-left: 40px;\">level: critical<\/p><p style=\"padding-left: 40px;\">&#8212;<\/p><p style=\"padding-left: 40px;\">logsource:<\/p><p style=\"padding-left: 80px;\">product: windows<br \/>service: sysmon<\/p><p style=\"padding-left: 40px;\">detection:<\/p><p style=\"padding-left: 40px;\">\u00a0 selection1:<\/p><p style=\"padding-left: 40px;\">\u00a0\u00a0\u00a0 EventID: 11<\/p><p style=\"padding-left: 40px;\">\u00a0\u00a0\u00a0 TargetFilename|contains:<br \/>\u00a0 \u00a0&#8211; PersonalKYC.pdf.lnk<br \/>\u00a0&#8211; 1.lnk<br \/>&#8211; \\Microsoft\\Credentials\\MediaPlayer\\ddpp.exe<br \/>&#8211; \\microsoft\\media player\\player\\fplayer.exe<\/p><p style=\"padding-left: 40px;\">&#8212;<\/p><p style=\"padding-left: 40px;\">logsource:<\/p><p style=\"padding-left: 80px;\">category: process_creation<br \/>product: windows<\/p><p style=\"padding-left: 40px;\">detection:<\/p><p style=\"padding-left: 40px;\">\u00a0 selection2:<\/p><p style=\"padding-left: 40px;\">\u00a0\u00a0\u00a0 CommandLine:<\/p><p style=\"padding-left: 40px;\">\u00a0\u00a0\u00a0 &#8211; cmd.exe \/c path=%windir%\\system32&amp;move &#8220;PersonalKYC.pdf.lnk&#8221; &#8220;%tmp%\\1.lnk&#8221;&amp;type &#8220;%tmp\\1.lnk&#8221; |find &#8220;END2&#8221;&gt;&#8221;%tmp%\\0.js&#8221;&amp;wscript &#8220;%tmp%\\0.js&#8221;Mul<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>This summary of a technical analysis of the Evilnum Campaign by ESET gives a typical example of the type of reporting cyber threat analysts provide.<\/p>\n","protected":false},"author":2,"featured_media":1432,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[54,316,4],"tags":[1374,313,1375,25],"class_list":["post-1433","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-infrastructure","category-intelligence","tag-banking","tag-elections","tag-financial","tag-infrastructure"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"This summary of a technical analysis of the Evilnum Campaign by ESET gives a typical example of the type of reporting cyber threat analysts provide.\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<meta name=\"author\" content=\"Jane Ginn\"\/>\n\t<link rel=\"canonical\" href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/08\/potential-new-evilnum-campaign\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"CTIN - Cybersecurity Center\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Potential New EvilNum Campaign - CTIN\" \/>\n\t\t<meta property=\"og:description\" content=\"This summary of a technical analysis of the Evilnum Campaign by ESET gives a typical example of the type of reporting cyber threat analysts provide.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/08\/potential-new-evilnum-campaign\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"112\" \/>\n\t\t<meta property=\"og:image:height\" content=\"112\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2023-09-08T02:37:19+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2024-06-10T23:35:17+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Potential New EvilNum Campaign - CTIN\" \/>\n\t\t<meta name=\"twitter:description\" content=\"This summary of a technical analysis of the Evilnum Campaign by ESET gives a typical example of the type of reporting cyber threat analysts provide.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/08\\\/potential-new-evilnum-campaign\\\/#blogposting\",\"name\":\"Potential New EvilNum Campaign - CTIN\",\"headline\":\"Potential New EvilNum Campaign\",\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/EvilNum-Diaods-RightSize.jpg\",\"width\":1224,\"height\":712},\"datePublished\":\"2023-09-08T02:37:19+00:00\",\"dateModified\":\"2024-06-10T23:35:17+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/08\\\/potential-new-evilnum-campaign\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/08\\\/potential-new-evilnum-campaign\\\/#webpage\"},\"articleSection\":\"CyberSecurity, Infrastructure, Intelligence, banking, elections, financial, infrastructure\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/08\\\/potential-new-evilnum-campaign\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"position\":2,\"name\":\"Posts\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/#listItem\",\"name\":\"COTH\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/#listItem\",\"position\":3,\"name\":\"COTH\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/infrastructure\\\/#listItem\",\"name\":\"Infrastructure\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/infrastructure\\\/#listItem\",\"position\":4,\"name\":\"Infrastructure\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/infrastructure\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/08\\\/potential-new-evilnum-campaign\\\/#listItem\",\"name\":\"Potential New EvilNum Campaign\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/#listItem\",\"name\":\"COTH\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/08\\\/potential-new-evilnum-campaign\\\/#listItem\",\"position\":5,\"name\":\"Potential New EvilNum Campaign\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/infrastructure\\\/#listItem\",\"name\":\"Infrastructure\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\",\"name\":\"Cyber Threat Intelligence Network\",\"description\":\"Cybersecurity Center\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"telephone\":\"+14804624039\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cropped-cropped-2020-logo.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/08\\\/potential-new-evilnum-campaign\\\/#organizationLogo\",\"width\":757,\"height\":237},\"image\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/08\\\/potential-new-evilnum-campaign\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CyberThreatIntelligenceNetwork\\\/\",\"https:\\\/\\\/twitter.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/\",\"name\":\"Jane Ginn\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/rjg-PhonePhoto.PNG\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\",\"https:\\\/\\\/infosec.exchange\\\/@ctin\"],\"description\":\"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn\",\"jobTitle\":\"CTIN President & Co-Founder\",\"alumniOf\":[{\"@type\":\"EducationalOrganization\",\"name\":\"Norwich University\",\"sameAs\":\"https:\\\/\\\/online.norwich.edu\\\/online\\\/programs-courses\\\/programs\\\/master-science-cybersecurity\"}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/08\\\/potential-new-evilnum-campaign\\\/#webpage\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/08\\\/potential-new-evilnum-campaign\\\/\",\"name\":\"Potential New EvilNum Campaign - CTIN\",\"description\":\"This summary of a technical analysis of the Evilnum Campaign by ESET gives a typical example of the type of reporting cyber threat analysts provide.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/08\\\/potential-new-evilnum-campaign\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/EvilNum-Diaods-RightSize.jpg\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/08\\\/potential-new-evilnum-campaign\\\/#mainImage\",\"width\":1224,\"height\":712},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/08\\\/potential-new-evilnum-campaign\\\/#mainImage\"},\"datePublished\":\"2023-09-08T02:37:19+00:00\",\"dateModified\":\"2024-06-10T23:35:17+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"name\":\"Training Center\",\"description\":\"Cybersecurity Center\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Potential New EvilNum Campaign - CTIN<\/title>\n\n","aioseo_head_json":{"title":"Potential New EvilNum Campaign - CTIN","description":"This summary of a technical analysis of the Evilnum Campaign by ESET gives a typical example of the type of reporting cyber threat analysts provide.","canonical_url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/08\/potential-new-evilnum-campaign\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/08\/potential-new-evilnum-campaign\/#blogposting","name":"Potential New EvilNum Campaign - CTIN","headline":"Potential New EvilNum Campaign","author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/EvilNum-Diaods-RightSize.jpg","width":1224,"height":712},"datePublished":"2023-09-08T02:37:19+00:00","dateModified":"2024-06-10T23:35:17+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/08\/potential-new-evilnum-campaign\/#webpage"},"isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/08\/potential-new-evilnum-campaign\/#webpage"},"articleSection":"CyberSecurity, Infrastructure, Intelligence, banking, elections, financial, infrastructure"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/08\/potential-new-evilnum-campaign\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","position":1,"name":"Home","item":"https:\/\/cyberthreatintelligencenetwork.com","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","position":2,"name":"Posts","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/#listItem","name":"COTH"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/#listItem","position":3,"name":"COTH","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/infrastructure\/#listItem","name":"Infrastructure"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/infrastructure\/#listItem","position":4,"name":"Infrastructure","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/infrastructure\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/08\/potential-new-evilnum-campaign\/#listItem","name":"Potential New EvilNum Campaign"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/#listItem","name":"COTH"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/08\/potential-new-evilnum-campaign\/#listItem","position":5,"name":"Potential New EvilNum Campaign","previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/infrastructure\/#listItem","name":"Infrastructure"}}]},{"@type":"Organization","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization","name":"Cyber Threat Intelligence Network","description":"Cybersecurity Center","url":"https:\/\/cyberthreatintelligencenetwork.com\/","telephone":"+14804624039","logo":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/01\/cropped-cropped-2020-logo.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/08\/potential-new-evilnum-campaign\/#organizationLogo","width":757,"height":237},"image":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/08\/potential-new-evilnum-campaign\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","https:\/\/twitter.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social"]},{"@type":"Person","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/","name":"Jane Ginn","image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/07\/rjg-PhonePhoto.PNG"},"sameAs":["https:\/\/x.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social","https:\/\/infosec.exchange\/@ctin"],"description":"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn","jobTitle":"CTIN President & Co-Founder","alumniOf":[{"@type":"EducationalOrganization","name":"Norwich University","sameAs":"https:\/\/online.norwich.edu\/online\/programs-courses\/programs\/master-science-cybersecurity"}]},{"@type":"WebPage","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/08\/potential-new-evilnum-campaign\/#webpage","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/08\/potential-new-evilnum-campaign\/","name":"Potential New EvilNum Campaign - CTIN","description":"This summary of a technical analysis of the Evilnum Campaign by ESET gives a typical example of the type of reporting cyber threat analysts provide.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website"},"breadcrumb":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/08\/potential-new-evilnum-campaign\/#breadcrumblist"},"author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"creator":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/EvilNum-Diaods-RightSize.jpg","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/08\/potential-new-evilnum-campaign\/#mainImage","width":1224,"height":712},"primaryImageOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/08\/potential-new-evilnum-campaign\/#mainImage"},"datePublished":"2023-09-08T02:37:19+00:00","dateModified":"2024-06-10T23:35:17+00:00"},{"@type":"WebSite","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website","url":"https:\/\/cyberthreatintelligencenetwork.com\/","name":"Training Center","description":"Cybersecurity Center","inLanguage":"en-US","publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"}}]},"og:locale":"en_US","og:site_name":"CTIN - Cybersecurity Center","og:type":"article","og:title":"Potential New EvilNum Campaign - CTIN","og:description":"This summary of a technical analysis of the Evilnum Campaign by ESET gives a typical example of the type of reporting cyber threat analysts provide.","og:url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/08\/potential-new-evilnum-campaign\/","og:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:secure_url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:width":112,"og:image:height":112,"article:published_time":"2023-09-08T02:37:19+00:00","article:modified_time":"2024-06-10T23:35:17+00:00","article:publisher":"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","twitter:card":"summary","twitter:site":"@CTIN_Global","twitter:title":"Potential New EvilNum Campaign - CTIN","twitter:description":"This summary of a technical analysis of the Evilnum Campaign by ESET gives a typical example of the type of reporting cyber threat analysts provide.","twitter:creator":"@CTIN_Global","twitter:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png"},"aioseo_meta_data":{"post_id":"1433","title":null,"description":null,"keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2025-08-25 21:53:56","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2024-04-18 16:57:44","updated":"2025-08-25 21:53:56"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/\" title=\"Posts\">Posts<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/\" title=\"COTH\">COTH<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/infrastructure\/\" title=\"Infrastructure\">Infrastructure<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tPotential New EvilNum Campaign\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/cyberthreatintelligencenetwork.com"},{"label":"Posts","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/"},{"label":"COTH","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/"},{"label":"Infrastructure","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/infrastructure\/"},{"label":"Potential New EvilNum Campaign","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/08\/potential-new-evilnum-campaign\/"}],"amp_enabled":false,"_links":{"self":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/1433","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/comments?post=1433"}],"version-history":[{"count":166,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/1433\/revisions"}],"predecessor-version":[{"id":3399,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/1433\/revisions\/3399"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media\/1432"}],"wp:attachment":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media?parent=1433"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/categories?post=1433"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/tags?post=1433"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}