Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

TA453: Dual-Platform Malware Attacks

July 10, 2023
Reading Time: 2 mins read
in Alerts
TA453: Dual-Platform Malware Attacks

 

The Iranian nation-state actor, TA453, has been implicated in a fresh series of spear-phishing attacks that target both Windows and macOS operating systems with malware.

According to a report by Proofpoint, TA453 utilized various cloud hosting providers to implement a unique infection chain, deploying a newly identified PowerShell backdoor called GorjolEcho. In their pursuit of espionage, TA453 adapted their tactics to include an Apple-centric infection chain named NokNok, employing multi-persona impersonation techniques.

TA453, also known as APT35, Charming Kitten, Mint Sandstorm, and Yellow Garuda, is a threat group associated with Iran’s Islamic Revolutionary Guard Corps (IRGC) and has been active since at least 2011.

Recent findings by Volexity highlighted TA453’s utilization of an updated version of the Powershell implant known as CharmPower (also referred to as GhostEcho or POWERSTAR).

In a mid-May 2023 attack sequence discovered by an enterprise security firm, TA453 targeted a nuclear security expert at a U.S.-based foreign affairs think tank through phishing emails. These emails contained a malicious link leading to a Google Script macro, redirecting the victim to a Dropbox URL hosting a RAR archive. Within the file, an LNK dropper initiated a multi-stage procedure to deploy GorjolEcho, which displayed a decoy PDF document while waiting for next-stage payloads from a remote server.

Upon identifying that the target used an Apple computer, TA453 adjusted its approach by sending a second email containing a ZIP archive that embedded a Mach-O binary disguised as a VPN application.

However, the binary was, in fact, an AppleScript that connected to a remote server to download a Bash script-based backdoor named NokNok. NokNok was capable of fetching up to four modules, gathering information on running processes, installed applications, system metadata, and setting persistence using LaunchAgents.

The researchers noted that NokNok’s modules closely resembled those associated with CharmPower, with some source code overlaps with macOS malware previously attributed to TA453 in 2017.

Additionally, the threat actor employed a fake file-sharing website likely designed to identify visitors and track successful victims. TA453 continually adapts its malware arsenal, deploying novel file types, and targeting new operating systems while striving to achieve its goals of intrusive and unauthorized reconnaissance, simultaneously complicating detection efforts.

Reference:
  • Welcome to New York: Exploring TA453’s Foray into LNKs and Mac Malware
Tags: APT35Charming KittenCyber AlertCyber Alerts 2023CyberattackCybersecurityIranJuly 2023MalwareMint SandstormNokNokPhishingSpear phishingTA453VulnerabilitiesWindowsYellow Garuda
ADVERTISEMENT

Related Posts

TikTok Videos Spread Vidar StealC Malware

TikTok Videos Spread Vidar StealC Malware

May 23, 2025
TikTok Videos Spread Vidar StealC Malware

New ZeroCrumb Malware Steals Browser Cookies

May 23, 2025
TikTok Videos Spread Vidar StealC Malware

CISA Commvault ZeroDay Flaw Risks Secrets

May 23, 2025
GitLab Patch Stops Service Disruption Risks

Function Confusion Hits Serverless Clouds

May 22, 2025
GitLab Patch Stops Service Disruption Risks

3AM Ransomware Email Bomb and Vishing Threat

May 22, 2025
GitLab Patch Stops Service Disruption Risks

GitLab Patch Stops Service Disruption Risks

May 22, 2025

Latest Alerts

New ZeroCrumb Malware Steals Browser Cookies

TikTok Videos Spread Vidar StealC Malware

CISA Commvault ZeroDay Flaw Risks Secrets

GitLab Patch Stops Service Disruption Risks

3AM Ransomware Email Bomb and Vishing Threat

Function Confusion Hits Serverless Clouds

Subscribe to our newsletter

    Latest Incidents

    Cetus Crypto Exchange Hacked For $223M

    MCP Data Breach Hits 235K NC Lab Patients

    UFCW Data Breach Risks Social Security Data

    Cyberattack Paralyzes French Hauts de Seine

    Santa Fe City Loses $324K In Hacker Scam

    Belgium Housing Hit by Ransomware Attack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial