Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

New Telecom Espionage Threat

September 22, 2023
Reading Time: 2 mins read
in Alerts

A newly discovered threat actor, known as ‘Sandman,’ has emerged, targeting telecommunication service providers in the Middle East, Western Europe, and South Asia.

Furthermore, this actor employs a modular info-stealing malware called ‘LuaDream.’ SentinelLabs, in collaboration with QGroup GmbH, uncovered this malicious activity in August 2023 and named both the threat actor and malware after the internal name of the backdoor, ‘DreamLand client.’

Sandman operates with a low profile, evading detection while maintaining long-term access to compromised systems, enhancing its cyberespionage capabilities. Its primary targets include telecommunication service providers in the Middle East, Western Europe, and South Asia, often gaining initial access through stolen administrative credentials.

Sandman employs “pass-the-hash” attacks to authenticate to remote servers and services by extracting and reusing NTLM hashes stored in memory, demonstrating a focus on privileged or confidential information.

Additionally, Sandman utilizes the ‘LuaDream’ malware, employing DLL hijacking techniques in targeted attacks. ‘LuaDream’ collects data and manages plugins that enhance its functionality, often received from a command and control server (C2) and executed locally. This malware’s development shows activity dating back to June 2022, utilizing a sophisticated in-memory process for staging, designed to evade detection.

Despite revealing some details about Sandman’s custom malware and C2 server infrastructure, the threat actor’s origins remain undisclosed. Sandman joins the ranks of advanced attackers targeting telecom companies, utilizing stealthy backdoors to execute challenging-to-detect cyberespionage operations, given the sensitivity of the data these providers handle.

Reference:
  • Sandman APT | A Mystery Group Targeting Telcos with a LuaJIT Toolkit
Tags: Cyber AlertCyber Alerts 2023CybersecurityespionageLuaDreamMalwareMiddle Eastpass-the-hashSandmanSentinelLabsSeptember 2023South AsiaVulnerabilitiesWestern Europe
ADVERTISEMENT

Related Posts

TikTok Videos Spread Vidar StealC Malware

TikTok Videos Spread Vidar StealC Malware

May 23, 2025
TikTok Videos Spread Vidar StealC Malware

New ZeroCrumb Malware Steals Browser Cookies

May 23, 2025
TikTok Videos Spread Vidar StealC Malware

CISA Commvault ZeroDay Flaw Risks Secrets

May 23, 2025
GitLab Patch Stops Service Disruption Risks

Function Confusion Hits Serverless Clouds

May 22, 2025
GitLab Patch Stops Service Disruption Risks

3AM Ransomware Email Bomb and Vishing Threat

May 22, 2025
GitLab Patch Stops Service Disruption Risks

GitLab Patch Stops Service Disruption Risks

May 22, 2025

Latest Alerts

New ZeroCrumb Malware Steals Browser Cookies

TikTok Videos Spread Vidar StealC Malware

CISA Commvault ZeroDay Flaw Risks Secrets

GitLab Patch Stops Service Disruption Risks

3AM Ransomware Email Bomb and Vishing Threat

Function Confusion Hits Serverless Clouds

Subscribe to our newsletter

    Latest Incidents

    Cetus Crypto Exchange Hacked For $223M

    MCP Data Breach Hits 235K NC Lab Patients

    UFCW Data Breach Risks Social Security Data

    Cyberattack Paralyzes French Hauts de Seine

    Santa Fe City Loses $324K In Hacker Scam

    Belgium Housing Hit by Ransomware Attack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial