Researchers discover new hacker group “Metador”

Share post:

Researchers from SentinelLabs have uncovered a hacking group called “Metador,” which has been compromising telecom companies, Internet Service Providers (ISPs) and universities for two years.

The new threat group was discovered after one of the victims used Singularity, SentinelOne’s advanced XDR detection and response solutions, months after Metador compromised its network.

Although Metador was found in a Middle Eastern telecommunications company, researchers said the operation targets organizations in the Middle East and Africa with the goal to gain long-term persistence for cyber espionage.

Metador has not been associated with any group. SentinelLabs stated in its report that Metador is “managing carefully segmented infrastructure per victim and quickly deploying intricate countermeasures in the presence of security solutions.”

Details of initial infection are not known, but the custom implants were decrypted and loaded into memory through “cdb.exe,” the debugging tool in Windows that was used in the attack as LoLBin, which lives on the-binary). It was used to decrypt and load the two custom “metaMain” and “mafalda,” two custom Windows malware frameworks.

The metaMain implant is used for other “hands-on” operations such as screenshots, performing file actions, logging keyboard events, and executing arbitrary shell codes. Mafalda is a versatile implant, and its commands include file operations, reading contents or directories that manipulate the registry, exploring the network and system, and exfiltrating data to the command and control (C2) server.

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways