Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

TA453: Dual-Platform Malware Attacks

July 10, 2023
Reading Time: 2 mins read
in Alerts
TA453: Dual-Platform Malware Attacks

 

The Iranian nation-state actor, TA453, has been implicated in a fresh series of spear-phishing attacks that target both Windows and macOS operating systems with malware.

According to a report by Proofpoint, TA453 utilized various cloud hosting providers to implement a unique infection chain, deploying a newly identified PowerShell backdoor called GorjolEcho. In their pursuit of espionage, TA453 adapted their tactics to include an Apple-centric infection chain named NokNok, employing multi-persona impersonation techniques.

TA453, also known as APT35, Charming Kitten, Mint Sandstorm, and Yellow Garuda, is a threat group associated with Iran’s Islamic Revolutionary Guard Corps (IRGC) and has been active since at least 2011.

Recent findings by Volexity highlighted TA453’s utilization of an updated version of the Powershell implant known as CharmPower (also referred to as GhostEcho or POWERSTAR).

In a mid-May 2023 attack sequence discovered by an enterprise security firm, TA453 targeted a nuclear security expert at a U.S.-based foreign affairs think tank through phishing emails. These emails contained a malicious link leading to a Google Script macro, redirecting the victim to a Dropbox URL hosting a RAR archive. Within the file, an LNK dropper initiated a multi-stage procedure to deploy GorjolEcho, which displayed a decoy PDF document while waiting for next-stage payloads from a remote server.

Upon identifying that the target used an Apple computer, TA453 adjusted its approach by sending a second email containing a ZIP archive that embedded a Mach-O binary disguised as a VPN application.

However, the binary was, in fact, an AppleScript that connected to a remote server to download a Bash script-based backdoor named NokNok. NokNok was capable of fetching up to four modules, gathering information on running processes, installed applications, system metadata, and setting persistence using LaunchAgents.

The researchers noted that NokNok’s modules closely resembled those associated with CharmPower, with some source code overlaps with macOS malware previously attributed to TA453 in 2017.

Additionally, the threat actor employed a fake file-sharing website likely designed to identify visitors and track successful victims. TA453 continually adapts its malware arsenal, deploying novel file types, and targeting new operating systems while striving to achieve its goals of intrusive and unauthorized reconnaissance, simultaneously complicating detection efforts.

Reference:
  • Welcome to New York: Exploring TA453’s Foray into LNKs and Mac Malware
Tags: APT35Charming KittenCyber AlertCyber Alerts 2023CyberattackCybersecurityIranJuly 2023MalwareMint SandstormNokNokPhishingSpear phishingTA453VulnerabilitiesWindowsYellow Garuda
ADVERTISEMENT

Related Posts

Microsoft Defender Bug Allows SYSTEM Access

Uncanny Automator Bug Risks WordPress Sites

May 14, 2025
Microsoft Defender Bug Allows SYSTEM Access

Devs Hit By PyPI Solana Token Secret Theft

May 14, 2025
Microsoft Defender Bug Allows SYSTEM Access

Microsoft Defender Bug Allows SYSTEM Access

May 14, 2025
Apple Fixes Critical Bugs in iOS and MacOS

Hackers Exploit Output Messenger Zero-Day

May 13, 2025
Apple Fixes Critical Bugs in iOS and MacOS

ASUS Fixes Critical Flaws in DriverHub

May 13, 2025
Apple Fixes Critical Bugs in iOS and MacOS

Apple Fixes Critical Bugs in iOS and MacOS

May 13, 2025

Latest Alerts

Microsoft Defender Bug Allows SYSTEM Access

Uncanny Automator Bug Risks WordPress Sites

Devs Hit By PyPI Solana Token Secret Theft

Hackers Exploit Output Messenger Zero-Day

ASUS Fixes Critical Flaws in DriverHub

Apple Fixes Critical Bugs in iOS and MacOS

Subscribe to our newsletter

    Latest Incidents

    Alabama Cybersecurity Event Hits Services

    Andy Frain Data Breach Impacts 100k People

    Hong Kong DSC Hit By Ransomware Attack

    Alleged Steam Breach Exposes 89M Records

    Ulhasnagar Municipal Corporation Hacked

    Madison County Iowa Systems Disrupted

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial