Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

New Andromeda Cluster Targets Asia Pacific

December 6, 2024
Reading Time: 2 mins read
in Alerts
New Andromeda Cluster Targets Asia Pacific

A recently discovered cluster of Command and Control (C2) servers tied to the Andromeda/Gamarue malware family has raised concerns within the cybersecurity community. This newly identified cluster has been found to target manufacturing and logistics companies in the Asia-Pacific (APAC) region, where it is suspected that the motive behind the attacks is industrial espionage. Andromeda, also known as Gamarue, has been active since 2011 and is widely used by cybercriminals to establish backdoor access for stealing sensitive data and delivering additional malicious payloads.

The attack chain begins with infected USB drives, which are commonly used to deliver the Andromeda malware. These USB devices are manipulated to contain LNK files designed to deceive users into clicking on them, triggering the malware’s execution. Once executed, the malware uses rundll32.exe to load malicious DLL files that are named to appear as legitimate system files. This method allows the attacker to bypass security measures and establish an entry point for further exploitation.

The primary function of Andromeda is to serve as a backdoor, allowing attackers to download additional malware, steal passwords, and provide remote access for ongoing control over infected systems. In the current campaign, the malware establishes communication with C2 servers using domains such as suckmycocklameavindustry[.]in, where it sends data back to the attacker. The malware also creates various files with different extensions, including .tmp, .exe, and .bin, in the victim’s system to facilitate the attack and maintain persistence.

The discovery of this cluster of C2 servers underscores the growing need for robust cybersecurity measures, especially in sectors such as manufacturing and logistics. Organizations in these industries must remain vigilant against such threats and implement strong defenses against USB-based attacks, ensuring that their systems are adequately protected from backdoor access and espionage activities. Regularly updating security protocols and training employees to recognize and avoid potential phishing attempts are crucial steps in mitigating the risk posed by these types of advanced malware campaigns.

Reference:

  • New Andromeda C2 Cluster Targets Asia Pacific Manufacturing and Logistics Sectors
Tags: AndromedaAPACAsia PacificCyber AlertsCyber Alerts 2024Cyber threatsDecember 2024GamarueMalware
ADVERTISEMENT

Related Posts

VexTrio TDS Uses Adtech To Spread Malware

Simple Typo Breaks AI Safety Via TokenBreak

June 13, 2025
VexTrio TDS Uses Adtech To Spread Malware

VexTrio TDS Uses Adtech To Spread Malware

June 13, 2025
VexTrio TDS Uses Adtech To Spread Malware

Old Discord Links Now Lead To Malware

June 13, 2025
SmartAttack Uses Sound To Steal PC Data

SmartAttack Uses Sound To Steal PC Data

June 13, 2025
SmartAttack Uses Sound To Steal PC Data

Coordinated Brute Force Hits Tomcat Manager

June 13, 2025
SmartAttack Uses Sound To Steal PC Data

Pentest Tool TeamFiltration Hits Entra ID

June 12, 2025

Latest Alerts

Old Discord Links Now Lead To Malware

VexTrio TDS Uses Adtech To Spread Malware

Simple Typo Breaks AI Safety Via TokenBreak

Coordinated Brute Force Hits Tomcat Manager

SmartAttack Uses Sound To Steal PC Data

Pentest Tool TeamFiltration Hits Entra ID

Subscribe to our newsletter

    Latest Incidents

    Cyberattack On Brussels Parliament Continues

    Swedish Broadcaster SVT Hit By DDoS

    Major Google Cloud Outage Disrupts Web

    AI Spam Hijacks Official US Vaccine Site

    DragonForce Ransomware Hits Philly Schools

    Erie Insurance Cyberattack Halts Operations

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial