By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Notification
Latest News
OpenAI may use Associated Press archive for AI training
July 14, 2023
EU users can hold conversations with Google Bard from training set
July 14, 2023
Aptos, the new default font for Microsoft Office
July 14, 2023
BlackLotus UEFI bootkit sources published on GitHub
July 14, 2023
Hackers from the XDSpy cyber-espionage group attacked Russian organizations on behalf of the Ministry of Emergency Situations
July 14, 2023
Aa
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Reading: One of the subgroups of Darkside has hacked the supplier of video surveillance systems
Share
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Aa
Search
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Follow US
Security Parrot - Cyber Security News, Insights and Reviews > News > One of the subgroups of Darkside has hacked the supplier of video surveillance systems
News

One of the subgroups of Darkside has hacked the supplier of video surveillance systems

Last updated: 2021/06/18 at 7:35 AM
Jim Koohyar Biniyaz Published June 18, 2021
Share
SHARE

Mandiant experts report that a hack group, which previously worked with the ransomware group DarkSide, hacked the website of an unnamed video surveillance system vendor and infected the official Windows application with malware.

The attack took place on May 18 and lasted until early June, until the moment when Mandiant specialists discovered the malware and notified the affected company. The malware was hidden inside a custom version of the Dahua SmartPSS Windows app that an unnamed video surveillance vendor made available to its customers to configure and manage.

It is reported that the Trojanized version of the application infected the machines affected by the SMOKEDHAM backdoor .

Attack scheme

Although the ransomware group DarkSide announced it would cease operations last month after a scandalous attack on the Colonial Pipeline company, Mandiant researchers have linked the hack to the video surveillance provider to one of three main subgroups DarkSide, which the company tracks under the ID UNC2465.

According to analysts, such “partner groups” of DarkSide, known under the codenames UNC2628, UNC2659 and UNC2465, launched attacks on corporate networks, and then deployed there a ransomware that they rented from the authors of DarkSide. As soon as the victims paid the ransom, the “partners” received 85% of the amount paid and moved on to new goals.

The linking of the recent incident to UNC2465 was possible thanks to the aforementioned SMOKEDHAM, which has so far been used exclusively in UNC2465 campaigns. And although in this case the attack did not lead to the deployment of DarkSide or other ransomware on the victim’s network, the researchers warn that attackers may soon switch to the new RaaS (Ransomware-as-a-Service) and return to ransomware attacks.

Weekly Updates For Our Loyal Readers!

Jim Koohyar Biniyaz June 18, 2021
Share this Article
Facebook Twitter Email Copy Link Print

Archives

  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020

You Might Also Like

News

OpenAI may use Associated Press archive for AI training

July 14, 2023
News

EU users can hold conversations with Google Bard from training set

July 14, 2023
News

Aptos, the new default font for Microsoft Office

July 14, 2023
News

BlackLotus UEFI bootkit sources published on GitHub

July 14, 2023

© 2022 Parrot Media Network. All Rights Reserved.

  • Home
  • Parrot Media Group
  • Privacy Policy
  • Terms and Conditions
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Zero spam, Unsubscribe at any time.

Removed from reading list

Undo
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?