Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Matrix Botnet

LilacSquid (UAT-4820) – Threat Actor

March 2, 2025
Reading Time: 4 mins read
in Threat Actors
LilacSquid (UAT-4820) – Threat Actor

LilacSquid

Other Names

UAT-4820

Date of Initial Activity

2021

Suspected Attribution 

Cybercriminal

Government Affiliation

No

Associated Groups

Unknown

Motivation

Financial Gain

Associated Tools

MeshAgent
PurpleInk
InkBox
InkLoader

Overview

The advanced persistent threat actor known as LilacSquid has emerged as a sophisticated and stealthy player in the world of cyber espionage. Active since at least 2021, LilacSquid has been attributed with a series of complex and targeted data theft campaigns. This threat actor demonstrates a high level of versatility and adaptability, employing a mix of open-source tools and custom malware to compromise and control a wide range of victim organizations. The sophistication of LilacSquid’s attacks is underscored by their use of advanced techniques and tools to evade detection and maintain access. Their operations bear similarities to those of North Korean APT groups, such as Andariel and Lazarus, particularly in their use of remote management tools and tunneling mechanisms. This connection highlights the advanced nature of LilacSquid’s tactics and their strategic approach to cyber espionage.
Defensive Measures
Organizations can detect and mitigate threats from LilacSquid’s campaign using various tools and strategies. Cisco Secure Endpoint, Secure Web Appliance, and Secure Email can block and detect malicious activities associated with this campaign. Additionally, Cisco Secure Firewall, Umbrella, and Secure Malware Analytics provide comprehensive protection against the malicious tools and techniques used by LilacSquid. For updated detection rules, open-source Snort users can refer to the latest rule packs available on Snort.org. Common targets
Their operations span across various industries, including information technology, energy, and pharmaceuticals, with notable activity in the United States, Europe, and Asia.

Attack vectors

Exploitation of Public-Facing Applications Compromised Remote Desktop Protocol (RDP) Credentials Phishing Emails Malicious Attachments or Links Exploitation of Vulnerabilities in Internet-Exposed Servers

How they operate

Infection and Initial Access
LilacSquid employs several techniques to gain initial access to their targets. The first vector involves exploiting vulnerabilities in public-facing applications. These applications, often accessible via the internet, are susceptible to various exploits, which LilacSquid utilizes to deploy their malware. Another significant attack vector is the use of compromised Remote Desktop Protocol (RDP) credentials. By leveraging stolen RDP credentials, the threat actor gains direct access to the target systems, bypassing many conventional security defenses. Upon successful infiltration, LilacSquid deploys a suite of tools designed to establish control and facilitate further attacks. The initial stage of their infection chain commonly involves the deployment of MeshAgent, an open-source remote management tool. MeshAgent is utilized to establish persistent access, allowing the threat actor to conduct reconnaissance and deploy additional malware. This tool’s integration is crucial, as it facilitates the management and manipulation of compromised systems remotely.
Deployment of Custom Malware
The primary tool in LilacSquid’s arsenal is PurpleInk, a highly customized variant of the QuasarRAT. PurpleInk is a versatile Remote Access Trojan (RAT) with extensive capabilities, including system enumeration, file manipulation, and process management. This malware enables LilacSquid to gather a wide range of information from the infected hosts, execute commands, and maintain a robust foothold within the compromised network. PurpleInk is often accompanied by configuration files that are base64-decoded and decrypted to provide the necessary parameters for communication with command-and-control (C2) servers. Another critical component in LilacSquid’s toolkit is InkLoader, a .NET-based malware loader designed to run hardcoded executables or commands. InkLoader serves as a persistence mechanism, ensuring that the malware remains operational across system reboots. This loader typically works in tandem with PurpleInk, enhancing its deployment and execution capabilities.
Advanced Techniques and Tactics
LilacSquid’s operations are marked by their sophisticated use of additional tools such as Secure Socket Funneling (SSF). SSF is employed for proxying and tunneling multiple sockets through a single secure TLS tunnel, which helps obfuscate the network traffic and further evades detection. The deployment of SSF, alongside other tools, allows LilacSquid to create multiple channels for data exfiltration and secondary access. In terms of persistence and further exploitation, LilacSquid utilizes InkBox, an older custom malware loader. InkBox reads and decrypts files from the disk, executing the secondary payload, which in this case is often PurpleInk. This modular approach to infection ensures that the malware is both versatile and resilient against detection.

MITRE Tactics and Techniques

Exploitation of Public-Facing Application – Exploiting vulnerabilities in web applications (T1190) Compromised Remote Desktop Protocol (RDP) Credentials – Using stolen RDP credentials for initial access (T1076) Execution – Running scripts and binaries for malware execution (T1059, T1203) Remote Access Tools (RATs) – Deploying and utilizing RATs like PurpleInk for persistent access (T1219, T1021) Data Staged – Collecting and staging data for exfiltration (T1074) Command and Control – Using MeshAgent for command and control (T1071, T1105) Credential Dumping – Gathering credentials from compromised systems (T1003) Lateral Movement – Moving through network using legitimate credentials or remote tools (T1075, T1210) Exfiltration Over Command and Control Channel – Sending stolen data through established C2 channels (T1041)

Impact / Significant Attacks

Pharmaceutical Industry Breach (Asia, 2021–2024): LilacSquid targeted organizations within the pharmaceutical sector in Asia. The group’s sophisticated malware and exploitation techniques aimed at stealing sensitive research and development data. Energy Sector Attack (Europe, 2022–2024): In this campaign, LilacSquid breached organizations in the European energy sector. The attack involved exploiting vulnerabilities in public-facing applications and compromised RDP credentials to gain unauthorized access and siphon critical operational data. IT Sector Breach (United States, 2021–2024): LilacSquid’s activities in the U.S. involved targeting IT organizations that build software for research and industrial applications. The group exploited these organizations to gain insights into software development and potentially affect software supply chains.  
References:
  • LilacSquid: The stealthy trilogy of PurpleInk, InkBox and InkLoader
Tags: AndarielAPTAsiaCybercriminalsEuropeInkBoxInkLoaderLazarusLilacSquidMeshAgentNorth KoreaPhishingPurpleInkRATThreat ActorsUAT-4820United States
ADVERTISEMENT

Related Posts

Storm-1811 (Cybercriminal) – Threat Actor

Storm-1811 (Cybercriminal) – Threat Actor

March 2, 2025
CopyCop (State-Sponsored) – Threat Actor

CopyCop (State-Sponsored) – Threat Actor

March 2, 2025
Storm-0539 – Threat Actor

Storm-0539 – Threat Actor

March 2, 2025
Void Manticore (Storm-0842) – Threat Actor

Void Manticore (Storm-0842) – Threat Actor

March 2, 2025
Unfading Sea Haze – Threat Actor

Unfading Sea Haze – Threat Actor

March 2, 2025
Ikaruz Red Team – Threat Actor

Ikaruz Red Team – Threat Actor

March 2, 2025

Latest Alerts

Old Discord Links Now Lead To Malware

VexTrio TDS Uses Adtech To Spread Malware

Simple Typo Breaks AI Safety Via TokenBreak

Coordinated Brute Force Hits Tomcat Manager

SmartAttack Uses Sound To Steal PC Data

Pentest Tool TeamFiltration Hits Entra ID

Subscribe to our newsletter

    Latest Incidents

    Cyberattack On Brussels Parliament Continues

    Swedish Broadcaster SVT Hit By DDoS

    Major Google Cloud Outage Disrupts Web

    AI Spam Hijacks Official US Vaccine Site

    DragonForce Ransomware Hits Philly Schools

    Erie Insurance Cyberattack Halts Operations

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial