Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Matrix Botnet

Actor240524 (APT) – Threat Actor

February 10, 2025
Reading Time: 4 mins read
in APT, Threat Actors
Actor240524 (APT) – Threat Actor

Actor240524

Date of Initial Activity

2024

Location

Unknown

Suspected Attribution 

APT

Targeted Countries

Israel

Azerbaijan

Motivation

Cyberwarfare

Software

Windows

Overview

In an evolving landscape of cybersecurity threats, a new advanced persistent threat (APT) group, dubbed Actor240524, has emerged with a series of sophisticated cyberattacks targeting Azerbaijan and Israel. Discovered by NSFOCUS Security Labs (NSL), this new group utilized a blend of novel tactics and malware to infiltrate diplomatic circles, focusing on stealing sensitive governmental data. Unlike other known APT groups, Actor240524’s attack techniques do not directly align with any existing cyber threat groups, marking this as a unique and concerning development in the world of cyber espionage. Their first major campaign took place on July 1, 2024, and targeted diplomatic personnel with spear-phishing attacks. Actor240524’s modus operandi is centered around social engineering and exploiting common office tools to deliver their payload. The attackers used a malicious Word document, seemingly official in nature, as the bait. The document, titled “iden.doc,” contained blurry images designed to mimic official Azerbaijani government materials, including images of the national emblem, cabinet building, and administrative personnel. When a victim opened the document, they were prompted to click “Enable Content,” triggering the embedded VBA macro code. This macro functioned as a conduit to deploy a series of malicious executable files onto the system, marking the first step of a highly orchestrated attack.

Common targets

Public Administration 

Israel

Azerbaijan

Attack Vectors

Phishing

How they operate

At the heart of Actor240524’s attack strategy is the social engineering tactic, which relies on deceiving the victim into executing malicious content. The group begins its attack with a spear-phishing email, which contains a malicious Word document. This document, disguised as an official Azerbaijani government file, contains blurry images designed to mislead the target into thinking it is an authentic piece of communication. The images within the document are structured to appear official, showcasing the Azerbaijani national emblem, government buildings, and personnel listings, making it highly convincing to the victim. Once the victim opens the document and is prompted to click “Enable Content,” the VBA macro code embedded in the document is triggered, leading to the initial phase of the attack. The macro embedded within the Word document plays a critical role in the attack’s execution. Upon activation, the macro code decrypts the malicious payload hidden inside the document and stores it in a specific location on the victim’s system, typically in the folder C:\Users\Public\Documents. The file, labeled MicrosoftWordUpdater.log, is designed to confuse the victim into thinking it is a harmless log file. In reality, this is an executable file, and it serves as the initial loader for the malware. Once this file is executed, it begins the process of decrypting and launching additional malicious payloads, namely ABCloader and ABCsync. The ABCloader component is the first significant stage of the infection. Its primary function is to identify the operating environment and ensure the system is not a virtual machine or sandbox designed for malware analysis. ABCloader does this by running a series of checks, including examining the hardware environment for breakpoints and detecting the number of active processes. If these checks reveal that the system is under analysis, the loader halts its operation to avoid detection. If the environment passes these tests, ABCloader proceeds by decrypting and loading the next stage, ABCsync. ABCsync is the core of the Actor240524 attack. Once deployed, it establishes a connection with the attacker’s Command and Control (C2) server, allowing the attackers to issue remote commands and control the compromised system. This communication channel is designed to be stealthy, avoiding traditional detection methods used by security tools. The attacker can then use ABCsync to exfiltrate data, manipulate files, or even install additional malware onto the system. One of the most notable features of ABCsync is its ability to operate in memory, meaning it leaves minimal traces on the disk, making detection even more challenging. Additionally, Actor240524 has integrated several advanced anti-analysis techniques within both ABCloader and ABCsync. These techniques include API-level encryption, which prevents security tools from easily analyzing the malicious code, and screen resolution detection, which helps the malware determine if it is being run in an environment where it might be monitored. Actor240524 also uses process count detection to check if the number of running processes aligns with typical user behavior, signaling whether the malware is under scrutiny. These layered evasion techniques significantly enhance the group’s ability to avoid detection by both automated systems and human analysts. Moreover, Actor240524 has exhibited a high level of operational security. The group takes measures to ensure their activities remain hidden even after the malware has been installed on the victim’s system. For example, once the attack is complete, ABCsync ensures that the malware communicates with the C2 server in a manner that avoids triggering network-based detection tools, using techniques such as encrypted communication channels and frequent communication intervals to mask its presence. In conclusion, Actor240524’s technical sophistication underscores the evolving nature of modern cyber threats. Their use of social engineering tactics, combined with a multi-stage payload that includes sophisticated loaders, anti-analysis checks, and encrypted communications, makes them a formidable adversary. As the threat landscape continues to evolve, organizations must enhance their cybersecurity defenses, adopting proactive threat hunting, advanced malware detection systems, and endpoint security solutions to counter the advanced techniques employed by groups like Actor240524. Understanding the technical operations of such threat actors is crucial to developing effective defenses against the next generation of APT campaigns.
References:
  • New APT Group Actor240524: A Closer Look at Its Cyber Tactics Against Azerbaijan and Israel
Tags: ABCloaderABCsyncActor240524APTAzerbaijanCybersecurityGovernmentIsraelMalwareNSFOCUS Security LabsNSLPhishingThreat ActorsWindows
ADVERTISEMENT

Related Posts

Storm-1811 (Cybercriminal) – Threat Actor

Storm-1811 (Cybercriminal) – Threat Actor

March 2, 2025
CopyCop (State-Sponsored) – Threat Actor

CopyCop (State-Sponsored) – Threat Actor

March 2, 2025
Storm-0539 – Threat Actor

Storm-0539 – Threat Actor

March 2, 2025
Void Manticore (Storm-0842) – Threat Actor

Void Manticore (Storm-0842) – Threat Actor

March 2, 2025
Unfading Sea Haze – Threat Actor

Unfading Sea Haze – Threat Actor

March 2, 2025
Ikaruz Red Team – Threat Actor

Ikaruz Red Team – Threat Actor

March 2, 2025

Latest Alerts

Fake Minecraft Mods On GitHub Spread Malware

Fake Invoices Deliver Sorillus RAT In Europe

Russian Vishing Scam Bypasses Google 2FA

New Linux Flaws Allow Easy Root Access

Google Fixes GerriScary Supply Chain Flaw

Langflow Flaw Delivers Flodrix DDoS Botnet

Subscribe to our newsletter

    Latest Incidents

    Hacker Mints $27M From Meta Pool Gets 132K

    UBS and Pictet Hit By Vendor Data Breach

    Cyberattack Disrupts Paris Air Show Website

    Scania Insurance Data Stolen In Partner Hack

    Pro Israel Group Claims $81M Nobitex Hack

    Hacker Sells Data Of 1M Cock.li Users

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial