

LockBit Ransomware – Active IOCs
March 3, 2025
AsyncRAT – Active IOCs
March 4, 2025
LockBit Ransomware – Active IOCs
March 3, 2025
AsyncRAT – Active IOCs
March 4, 2025Severity
High
Analysis Summary
Patchwork is an Advanced Persistent Threat (APT) group that has been active since at least 2014. The group primarily targets government, defense, and diplomatic organizations and academic institutions in South and Southeast Asia, including Pakistan and Bangladesh. However, the group has also targeted organizations in other regions, including Europe and North America.
The group is believed to be of Indian origin and has been linked to several cyber espionage campaigns. Patchwork has used various tactics, techniques, and procedures TTPs in its attacks. Once inside the networks, the group attempts to maintain persistence by regularly establishing new accounts, installing backdoors and other malicious tools, and performing malicious activities. Additionally, Patchwork has been known to employ social engineering techniques to track down and exfiltrate data from compromised systems. The group has also been known to use various evasion techniques to avoid detection by security solutions. In some cases, the group has remained undetected for extended periods.
An interesting development in Patchwork's timeline is its engagement in spearphishing operations targeting U.S. think tank groups during March and April of 2018. This campaign showcases Patchwork's interest in manipulating information on policy and international affairs. The group's strategy involves crafting tailored emails with malicious attachments or links, capitalizing on unsuspecting victims' curiosity or trust.
Patchwork is a sophisticated and persistent threat actor that poses a significant risk to targeted organizations. Organizations need robust security measures to protect against these types of attacks, including regular software updates and employee awareness training.
Impact
- Information Theft
- Unauthorized Remote Access
Indicators of Compromise
MD5
f3680b43abf218a16e58d991e54a6eee
54794189acbbfaf658bc5fd40b9a38dd
0c23562c6208b080ac0b698215529a62
c5ed8776b63b698697fa6b22303bda2a
SHA-256
5c8fec883cea528edc0c0a8d7c3688ad59e0aef7b8b960ab5583f9a1f15ba8b4
e83f568d7fdb2200174d7c10e193faf857a92b8309bb248054ec8823c39b95cd
c75cbbb4435e0e7392db00a854c72fe48ef5811308e84707cf5bbf3798527234
bd8b17bca9a0682a090a566a35d3338c3179c5471d7410d67bc86b96f98e94b4
SHA1
603bce9c344f8291742d92ad1b580137de66aaee
1e6ec96c3bed6ec728a629257150610aa4d4a286
2d40f82b15191fe4ce73fa47feb953c11ae0ba68
73129eb61234734e0704f52b0ef181e78a19a1d5
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Do not download documents attached in emails from unknown sources and strictly refrain from enabling macros when the source isn’t reliable.
- Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.
- Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.