Multiple D-Link Products Vulnerabilities
July 28, 2025Vidar Malware – Active IOCs
July 28, 2025Multiple D-Link Products Vulnerabilities
July 28, 2025Vidar Malware – Active IOCs
July 28, 2025Severity
High
Analysis Summary
Patchwork is an Advanced Persistent Threat (APT) group that has been active since at least 2014. The group primarily targets government, defense, and diplomatic organizations and academic institutions in South and Southeast Asia, including Pakistan and Bangladesh. However, the group has also targeted organizations in other regions, including Europe and North America.
The group is believed to be of Indian origin and has been linked to several cyber espionage campaigns. Patchwork has used various tactics, techniques, and procedures TTPs in its attacks. Once inside the networks, the group attempts to maintain persistence by regularly establishing new accounts, installing backdoors and other malicious tools, and performing malicious activities. Additionally, Patchwork has been known to employ social engineering techniques to track down and exfiltrate data from compromised systems. The group has also been known to use various evasion techniques to avoid detection by security solutions. In some cases, the group has remained undetected for extended periods.
An interesting development in Patchwork's timeline is its engagement in spearphishing operations targeting U.S. think tank groups during March and April of 2018. This campaign showcases Patchwork's interest in manipulating information on policy and international affairs. The group's strategy involves crafting tailored emails with malicious attachments or links, capitalizing on unsuspecting victims' curiosity or trust.
Patchwork is a sophisticated and persistent threat actor that poses a significant risk to targeted organizations. Organizations need robust security measures to protect against these types of attacks, including regular software updates and employee awareness training.
Impact
- Information Theft
- Unauthorized Remote Access
Indicators of Compromise
Domain Name
- datamero.org
- zebydigital.org
MD5
0dcef9d1e1cd96ed5b19c0befa1e6e7f
3699b8277299668f9e8489a465723be7
e8637f4951132c74862952539b56edf7
SHA-256
14137558073301053ccb26440d07e2def8a0add9029d42c4bf0776bf3c0f5659
89685b6881d6bad92c5c4e31e62f7db083760d9cd1b7a60d488f3fbcd2231058
e7472e7c75533cb6f548742d9e945b36a11e985788304b8f10572d1d08f28185
SHA1
f10746f3d1d1b8380b2469dfd00f381d4f65708f
1cb20bd566b4b095ac5f55b2c29d8c283df83f49
eb2b7c5f6d039241e06be5c4733c54f0e861998b
URL
- https://datamero.org/biuA873q4jIUBoaFibnoianbscoia/sitrie
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Do not download documents attached in emails from unknown sources and strictly refrain from enabling macros when the source isn’t reliable.
- Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.
- Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.