12 September 2023

RedFly APT lurked in the network of a national electricity grid org for 6 months


RedFly APT lurked in the network of a national electricity grid org for 6 months

A threat actor known as RedFly has compromised the network of an unnamed national electricity grid organization in Asia and had been quietly present in the victim network for six months, according to a new report from Symantec researchers.

The espionage group used the ShadowPad remote access trojan to compromise the target organization and steal credentials. While this RAT is a publicly available tool known to be used by multiple threat actors, the recent campaign leveraged tools and infrastructure previously linked to a cluster of APT41 activity (aka Brass Typhoon, Wicked Panda, Winnti, and Red Echo). Symantec tracks this recent activity as RedFly.

The first evidence of intrusion dates back to February 28, 2023, when ShadowPad was executed on a single computer. The malware was executed again in May, which suggests that the attackers maintained access to the network for three months.

The threat actor used a number of tools in the attack, including a keylogger that captured strokes in the log files in the hacked system, an espionage tool called Packerloader used to execute code that modified a driver file's permissions, as well as for creating credential dumps in the Windows registry and wiping Windows security event logs.

The attackers have also been observed utilizing PowerShell to run commands to collect information about specific storage devices on the compromised system.

“The frequency at which CNI organizations are being attacked appears to have increased over the past year and is now a source of concern. Threat actors maintaining a long-term, persistent presence on a national grid presents a clear risk of attacks designed to disrupt power supplies and other vital services in nation-states during times of increased political tension. While Symantec has not seen any disruptive activity by Redfly, the fact that such attacks have occurred in other regions means they are not outside the bounds of possibility,” the researchers warned.


Back to the list

Latest Posts

Cyber Security Week in Review: September 6, 2024

Cyber Security Week in Review: September 6, 2024

In brief: the US charges Russian GRU hackers for attacks on Ukraine, Apache, Cisco, Zyxel patch high-risk flaws, Google fixes Android zero-day, and more.
6 September 2024
Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Some of the documents appeared to be part of legitimate Red Team exercises, while other were intended for malicious purposes.
5 September 2024
US seizes 32 domains linked to Russian Doppelganger influence campaign

US seizes 32 domains linked to Russian Doppelganger influence campaign

The domains, used to disseminate propaganda, were seized as part of a broader effort to disrupt Russia’s attempts to interfere in the 2024 US Presidential Election.
5 September 2024