{"id":2864,"date":"2025-06-27T12:54:52","date_gmt":"2025-06-27T10:54:52","guid":{"rendered":"https:\/\/lab52.io\/blog\/?p=2864"},"modified":"2025-06-27T13:40:38","modified_gmt":"2025-06-27T11:40:38","slug":"snake-keylogger-in-geopolitical-affairs-abuse-of-trusted-java-utilities-in-cybercrime-operations","status":"publish","type":"post","link":"https:\/\/lab52.io\/blog\/snake-keylogger-in-geopolitical-affairs-abuse-of-trusted-java-utilities-in-cybercrime-operations\/","title":{"rendered":"Snake Keylogger in Geopolitical Affairs: Abuse of Trusted Java Utilities in Cybercrime Operations"},"content":{"rendered":"\n<p>The S2 Group&#8217;s intelligence team has identified through adversary tracking a new phishing campaign by Snake Keylogger, a Russian origin stealer programmed in .NET, targeting various types of victims, such as companies, governments or individuals.<\/p>\n\n\n\n<p>The campaign has been identified as using spearphishing emails offering oil products. These emails will contain a zipped attachment that uses the legitimate jsadebugd.exe binary and the Sideloading Dll technique to load Snake Keylogger into the legitimate InstallUtil.exe binary. jsadebugd is a legitimate Java utility used for debugging processes. However, its malicious use has recently been observed, something that has not been documented before.<\/p>\n\n\n\n<p>Snake Keylogger is distributed via a Malware-as-a-service (MaaS) model, previously used by different groups against different targets. One example is its use in campaigns against Ukraine by UAC-0041<sup data-fn=\"65fa8ae2-8e2c-4a9a-8115-6834295bf26c\" class=\"fn\"><a href=\"#65fa8ae2-8e2c-4a9a-8115-6834295bf26c\" id=\"65fa8ae2-8e2c-4a9a-8115-6834295bf26c-link\">1<\/a><\/sup> or TA558.<sup data-fn=\"6703ce85-913c-42d4-9365-82b9c7f5833a\" class=\"fn\"><a href=\"#6703ce85-913c-42d4-9365-82b9c7f5833a\" id=\"6703ce85-913c-42d4-9365-82b9c7f5833a-link\">2<\/a><\/sup><\/p>\n\n\n\n<p>The increase in geopolitical tensions in the Middle East, with the conflict between Iran and Israel and the recent US involvement, could have a direct and global impact on logistics and oil prices.<\/p>\n\n\n\n<p>This element could be used within social engineering phishing as has been detected in this case. This could be an indicator that the target of the campaign could be against organisations in the oil sector. On the other hand, they could exploit this theme due to the growing fear that is being generated in the Middle East regarding the possible increase in the price of oil and possible logistical problems in the event of a hypothetical closure of the Strait of Hormuz. <\/p>\n\n\n\n<p>Within the body of the email it can be seen that it is intended to impersonate one of Kazakhstan&#8217;s main oil companies: LLP KSK PETROLEUM LTD OIL AND GAS. Kazakhstan is one of the largest oil producers in Central Asia and a major gas producer.<sup data-fn=\"843f51f6-3ad0-4151-b8f7-3a022485f96a\" class=\"fn\"><a href=\"#843f51f6-3ad0-4151-b8f7-3a022485f96a\" id=\"843f51f6-3ad0-4151-b8f7-3a022485f96a-link\">2<\/a><\/sup><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Analysis<\/h1>\n\n\n\n<p>The campaign will use spearphishing emails offering oil products with a malicious attachment containing a zipped file.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"928\" height=\"801\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/Captura-desde-2025-06-25-09-14-30.png\" alt=\"\" class=\"wp-image-2866\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/Captura-desde-2025-06-25-09-14-30.png 928w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/Captura-desde-2025-06-25-09-14-30-300x259.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/Captura-desde-2025-06-25-09-14-30-768x663.png 768w\" sizes=\"(max-width: 928px) 100vw, 928px\" \/><figcaption class=\"wp-element-caption\">Example of spearphishing mail used<\/figcaption><\/figure><\/div>\n\n\n<p>This archive will contain a number of binaries, including the legitimate executable jsadebugd.exe vulnerable to the Sideloading Dll technique which will have been renamed to \u2018001 PETROLEUMLTD LLP KSK SCO 1 ORIGINAL (1).exe\u2019. When executed by the user this executable will load the malicious DLL jli.dll.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"618\" height=\"99\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/Captura-desde-2025-06-25-17-45-53.png\" alt=\"\" class=\"wp-image-2867\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/Captura-desde-2025-06-25-17-45-53.png 618w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/Captura-desde-2025-06-25-17-45-53-300x48.png 300w\" sizes=\"(max-width: 618px) 100vw, 618px\" \/><figcaption class=\"wp-element-caption\">Contents of the compressed file<\/figcaption><\/figure><\/div>\n\n\n<p>The Snake Keylogger binary will be stored inside the file \u2018concrt141.dll\u2019. To evade detection by security tools, binary data will have been added to the beginning of the file, just before the MZ header.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"634\" height=\"553\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/imagen-1.png\" alt=\"\" class=\"wp-image-2890\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/imagen-1.png 634w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/imagen-1-300x262.png 300w\" sizes=\"(max-width: 634px) 100vw, 634px\" \/><figcaption class=\"wp-element-caption\">Binary code added at the beginning of the executable<\/figcaption><\/figure><\/div>\n\n\n<p>This binary will be injected into the legitimate <strong>InstallUtil.exe<\/strong> process. As a form of persistence, the contents of the compressed file will be copied to the folder <strong>&#8220;%USERPROFILE%\\SystemRootDoc&#8221;.<\/strong> The persistence key <strong>&#8220;SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\\001 PETROLEUMLTD LLP KSK SCO 1 ORIGINAL (1)&#8221;<\/strong> will then be created with the command <strong>&#8220;cmd.exe \/C start &#8220;&#8221; \/D &#8220;%USERPROFILE%\\SystemRootDoc&#8221; &#8220;%USERPROFILE%\\SystemRootDoc\\001 PETROLEUMLTD LLP KSK SCO 1 ORIGINAL (1).exe&#8221;.<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"947\" height=\"176\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/Captura-desde-2025-06-25-18-03-16.png\" alt=\"\" class=\"wp-image-2870\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/Captura-desde-2025-06-25-18-03-16.png 947w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/Captura-desde-2025-06-25-18-03-16-300x56.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/Captura-desde-2025-06-25-18-03-16-768x143.png 768w\" sizes=\"(max-width: 947px) 100vw, 947px\" \/><figcaption class=\"wp-element-caption\">Registry key creation<\/figcaption><\/figure><\/div>\n\n\n<p>The SnakeLogger malware will send the IP of the computer along with the country of origin using legitimate websites such as <strong>reallyfreegeoip.org<\/strong> and <strong>checkip.dyndns.org.<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"57\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/imagen-1024x57.png\" alt=\"\" class=\"wp-image-2874\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/imagen-1024x57.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/imagen-300x17.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/imagen-768x43.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/imagen.png 1347w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Information exfiltrated by the malware<\/figcaption><\/figure><\/div>\n\n\n<p>Snake Keylogger will also exfiltrate passwords from various applications and browsers.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"490\" height=\"387\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/Captura-desde-2025-06-26-11-48-54.png\" alt=\"\" class=\"wp-image-2871\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/Captura-desde-2025-06-26-11-48-54.png 490w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/Captura-desde-2025-06-26-11-48-54-300x237.png 300w\" sizes=\"(max-width: 490px) 100vw, 490px\" \/><figcaption class=\"wp-element-caption\">Browser and application credentials collected<\/figcaption><\/figure><\/div>\n\n\n<p>Below is the complete list of browsers from which data was collected by the sample.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Google Chrome<\/strong><\/li>\n\n\n\n<li><strong>Google Chrome Canary<\/strong><\/li>\n\n\n\n<li><strong>Chromium<\/strong><\/li>\n\n\n\n<li><strong>Brave<\/strong><\/li>\n\n\n\n<li><strong>Vivaldi<\/strong><\/li>\n\n\n\n<li><strong>Comodo Dragon<\/strong><\/li>\n\n\n\n<li><strong>Blisk<\/strong><\/li>\n\n\n\n<li><strong>Torch<\/strong><\/li>\n\n\n\n<li><strong>C\u1ed1c C\u1ed1c<\/strong><\/li>\n\n\n\n<li><strong>QQ Browser<\/strong><\/li>\n\n\n\n<li><strong>xVast Browser<\/strong><\/li>\n\n\n\n<li><strong>QIP Surf<\/strong><\/li>\n\n\n\n<li><strong>Microsoft Edge<\/strong><\/li>\n\n\n\n<li><strong>Nichrome Browser<\/strong><\/li>\n\n\n\n<li><strong>Kometa Browser<\/strong><\/li>\n\n\n\n<li><strong>Superbird<\/strong><\/li>\n\n\n\n<li><strong>Opera<\/strong><\/li>\n\n\n\n<li><strong>Cent Browser<\/strong><\/li>\n\n\n\n<li><strong>Chedot<\/strong><\/li>\n\n\n\n<li><strong>Ghost Browser<\/strong><\/li>\n\n\n\n<li><strong>SRWare Iron<\/strong><\/li>\n\n\n\n<li><strong>UC Browser<\/strong><\/li>\n\n\n\n<li><strong>BlackHawk Browser<\/strong><\/li>\n\n\n\n<li><strong>Citrio<\/strong><\/li>\n\n\n\n<li><strong>Uran Browser<\/strong><\/li>\n\n\n\n<li><strong>Falkon<\/strong><\/li>\n\n\n\n<li><strong>Sputnik Browser<\/strong><\/li>\n\n\n\n<li><strong>CoolNovo (ChromePlus)<\/strong><\/li>\n\n\n\n<li><strong>Sleipnir<\/strong><\/li>\n\n\n\n<li><strong>Kinza<\/strong><\/li>\n\n\n\n<li><strong>Amigo<\/strong><\/li>\n\n\n\n<li><strong>Epic Privacy Browser<\/strong><\/li>\n\n\n\n<li><strong>360 Browser (English)<\/strong><\/li>\n\n\n\n<li><strong>360 Browser (China)<\/strong><\/li>\n\n\n\n<li><strong>XPom Browser<\/strong><\/li>\n\n\n\n<li><strong>Orbitum<\/strong><\/li>\n\n\n\n<li><strong>Iridium Browser<\/strong><\/li>\n\n\n\n<li><strong>7Star Browser<\/strong><\/li>\n\n\n\n<li><strong>Mozilla Firefox<\/strong><\/li>\n\n\n\n<li><strong>SeaMonkey<\/strong><\/li>\n\n\n\n<li><strong>Comodo IceDragon<\/strong><\/li>\n<\/ul>\n\n\n\n<p>The full list of applications collected by the sample is shown below.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Mozilla Thunderbird<\/strong><\/li>\n\n\n\n<li><strong>Microsoft Outlook<\/strong><\/li>\n\n\n\n<li><strong>Foxmail<\/strong><\/li>\n\n\n\n<li><strong>FileZilla<\/strong><\/li>\n<\/ul>\n\n\n\n<p>In addition the malware will collect the Windows product key of the device.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"168\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/Captura-desde-2025-06-26-18-16-29-1024x168.png\" alt=\"\" class=\"wp-image-2873\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/Captura-desde-2025-06-26-18-16-29-1024x168.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/Captura-desde-2025-06-26-18-16-29-300x49.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/Captura-desde-2025-06-26-18-16-29-768x126.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/Captura-desde-2025-06-26-18-16-29.png 1078w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Product key collection<\/figcaption><\/figure><\/div>\n\n\n<p>All this information will be exfiltrated through the SMTP protocol by sending mails from the account <strong>serverhar244@gpsamsterdamqroup[.]com<\/strong> to <strong>harrysnakelogger@dklak[.]cam.<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"562\" height=\"195\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/Captura-desde-2025-06-26-11-46-12.png\" alt=\"\" class=\"wp-image-2876\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/Captura-desde-2025-06-26-11-46-12.png 562w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/Captura-desde-2025-06-26-11-46-12-300x104.png 300w\" sizes=\"(max-width: 562px) 100vw, 562px\" \/><figcaption class=\"wp-element-caption\">Emails used for exfiltration<\/figcaption><\/figure><\/div>\n\n\n<p>In addition to the analysed sample, 29 others have been identified that also make use of the legitimate jsadebugd.exe binary. This behaviour has not been observed previously and seems to be characteristic of this specific campaign. All the samples have been attributed to the same group, as they deploy variants of the Snake Keylogger family, which reinforces the hypothesis of a coordinated operation led by the same actor.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Conclusion<\/h1>\n\n\n\n<p>This article analyzes how the actors behind Snake Keylogger take advantage of the current geopolitical situation, in the context of the recent conflict between Iran and Israel and the possible closure of the Strait of Hormuz, to extend its reach and infect new targets. In addition, the group behind this campaign is reportedly using jsadebugd, a legitimate Java executable vulnerable to the DLL sideloading technique, the use of which for malicious purposes has not previously been observed. This suggests an evolution in the group&#8217;s tactics, aimed at evading established detection mechanisms.<\/p>\n\n\n\n<p>The current situation of uncertainty in the Middle East could lead to increased interest from international energy companies in looking for new viable options to buy or sell oil products. In this case, this campaign could seek to take advantage of this profile of energy organisations.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">References<\/h1>\n\n\n\n<ul class=\"wp-block-list\">\n<li>[1] SOC Prime, <em>FormBook and Snake Keylogger information stealers massively distributed via email using RelicRace and RelicSource malware<\/em>, available online at <a href=\"https:\/\/socprime.com\/blog\/formbook-and-snake-keylogger-information-stealers-massively-distributed-via-email-using-relicrace-and-relicsource-malware\/\">https:\/\/socprime.com\/blog\/formbook-and-snake-keylogger-information-stealers-massively-distributed-via-email-using-relicrace-and-relicsource-malware\/<\/a><\/li>\n\n\n\n<li>[2] Packetlabs, <em>TA558 \u201cSteganoAmor\u201d uses steganography targeting unpatched MS\u2011Office apps<\/em>, available online at <a href=\"https:\/\/www.packetlabs.net\/posts\/ta558-steganoamor-uses-steganography-targeting-unpatched-ms-office-apps\/\">https:\/\/www.packetlabs.net\/posts\/ta558-steganoamor-uses-steganography-targeting-unpatched-ms-office-apps\/<\/a><\/li>\n\n\n\n<li>[3] Trade.gov, Kazakhstan \u2013 Oil and Gas Equipment and Services, available online at <a class=\"\" href=\"https:\/\/www.trade.gov\/country-commercial-guides\/kazakhstan-oil-gas-equipment-and-services\">https:\/\/www.trade.gov\/country-commercial-guides\/kazakhstan-oil-gas-equipment-and-services<\/a><\/li>\n<\/ul>\n\n\n\n<h1 class=\"wp-block-heading\">Indicators of Compromise (IoC)<\/h1>\n\n\n\n<h3 class=\"wp-block-heading\">Network indicators<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>serverhar244@gpsamsterdamqroup[.]com<\/td><td>Sender<\/td><\/tr><tr><td>fiber13.dnsiaas[.]com<\/td><td>Sender server<\/td><\/tr><tr><td>harrysnakelogger@dklak[.]cam<\/td><td>Receiver<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Samples<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>f099cb320a26b6284e9ca24b352b19d2109bb3df0beeded3c34377c9b934ed3<br>b<\/td><td>001 PETROLEUMLTD LLP KSK SCO 1 ORIGINAL (1).zip<\/td><\/tr><tr><td>9dae36cf2664e4bd348b1c7bcd9e886243fdd86e04d854e9a49e80ce358aa868<\/td><td>concrt141.dll<\/td><\/tr><tr><td>18e3d1542d9d375f2e1d4631e03e9874fca9a1655ee6d01121d0c94e138be17<br>4<\/td><td>jli.dll<\/td><\/tr><tr><td>76618263ac3d71779c18526c5ecc75a025ad0c78212b6a2bc089b22a1b8ca567<\/td><td>jsadebugd.exe (Legit)<\/td><\/tr><tr><td>2b7602cc1521101d116995e3e2ddfe0943349806378a0d40add81ba64e359b6<br>c<\/td><td>Vcruntime140.dll (Legit)<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Related samples using jsadebugd.exe<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>0171212441aef19491692062218aaa6fba9684f59e162691ab056a7369569ad9<\/li>\n\n\n\n<li>07dd7611034b2199726f006f93f144751d1f94e596908f8c5c2f5dcd245530af<\/li>\n\n\n\n<li>0877f1e39454438733df34bfec11fc23023a449c6ece07f0d15a852d140e64c5<\/li>\n\n\n\n<li>132ac2a27f43b1a830986c6d74b1e5cc855b248c93fa69893421c79d73a21fdb<\/li>\n\n\n\n<li>19c4eac334c6218e8a9fae3c0bae8a28beb75c474780f3a567974e96f94cf35a<\/li>\n\n\n\n<li>2e52628677cd6615c58b99ba3a85b3e41f60d752e2651293dcddcb814b9f6d18<\/li>\n\n\n\n<li>3d0df3b1329d9f7dae79678325e3855734a0f31f995c32fe2ec6632d5043e40c<\/li>\n\n\n\n<li>4855d6832e2889cfb0047e515b761c365bf8792ff30a84571ace896b7903f702<\/li>\n\n\n\n<li>54468a4c1261c1c3f4136854c29a50080be77416d040b083ac51776c957a1182<\/li>\n\n\n\n<li>5739aa1e1e86c11fb29cc40451bd55a06f3b8a98a58d364525a571d6b3c5c44c<\/li>\n\n\n\n<li>6d7158bf300a5a8769d106500a60141e63436bfc35cab1d24e047aad1dc880ce<\/li>\n\n\n\n<li>7cc53ec159a15cb2eacb8db7de25b35f2ef0e7aef0f3aa712c13560de16ddc20<\/li>\n\n\n\n<li>7daf0aa227d0e846edd1229cd744e3afd8ca3898e12836605d8f08038ef34203<\/li>\n\n\n\n<li>830703e20378110b1db917fcd498fa731aafed37fb1055c002693662053ad13c<\/li>\n\n\n\n<li>9f092c5069fdf376163326428b27d3f44283f6a5cc7fc6e57b5f8584919b7d8b<\/li>\n\n\n\n<li>abec75593c542693e475be1d3b6e51cffcb599acaa5089ea578f13f30316d628<\/li>\n\n\n\n<li>b33d93e82b4a964c1306d40b054e6a2703e050357a513ab8873651dd4d669f4b<\/li>\n\n\n\n<li>c9065f726d9bce286d1df97516f7fa04004fa4fea0719933926a58b8cb93b9a0<\/li>\n\n\n\n<li>ccde5a1ae465a65b483f8f97e3d4b97957fc869cc4aca8b4fdd02a821aaf45a8<\/li>\n\n\n\n<li>d244fede5f1b101146f733ec426fc7bb604ee4a7ab51ee88d8055b6866c7f708<\/li>\n\n\n\n<li>d3ca4ed0a462c73c55d3aed4cfa5a969eacfdde152f67437fe3bb14fefb17612<\/li>\n\n\n\n<li>d44bae3e448d78cdb976b7f811be53f32efb28d0d2ba964d09edd79a95dcc4b3<\/li>\n\n\n\n<li>dbf6d6a302e7c9f7ef1bbc32e4efd61ded782e08ef16ad86a7a4858b4e1e9d9d<\/li>\n\n\n\n<li>e31eda04b9ee78bb41c990eca89554ffadab27a5c47d5efd66f11f5947958dde<\/li>\n\n\n\n<li>eb56af5727614192c73d71b8a7c22933872076cb9e62380320dfe09937d4f052<\/li>\n\n\n\n<li>f099cb320a26b6284e9ca24b352b19d2109bb3df0beeded3c34377c9b934ed3b<\/li>\n\n\n\n<li>f44877b93c347c93a38c05c9144030d144a4af7c243a57957479448c23b081cd<\/li>\n\n\n\n<li>f4cc2b43480778392d4ea48e6af1ac47f646b3c3f295797752be2be20d13067e<\/li>\n\n\n\n<li>f57ac8aa79dbe0a7a746f8de245361d912fe1f59f43d5cde835e94a2dbf0cfdb<\/li>\n\n\n\n<li>fe223090ea59abc54312c48ed89765ea5c8821df78134adc094cd799973dde39<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The S2 Group&#8217;s intelligence team has identified through adversary tracking a new phishing campaign by Snake Keylogger, a Russian origin stealer programmed in .NET, targeting various types of victims, such as companies, governments or individuals. The campaign has been identified as using spearphishing emails offering oil products. These emails will contain a zipped attachment that [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":2896,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":"[{\"content\":\"SOC Prime, <em>FormBook and Snake Keylogger information stealers massively distributed via email using RelicRace and RelicSource malware<\/em>, disponible en l\u00ednea en <a href=\\\"https:\/\/socprime.com\/blog\/formbook-and-snake-keylogger-information-stealers-massively-distributed-via-email-using-relicrace-and-relicsource-malware\/\\\">https:\/\/socprime.com\/blog\/formbook-and-snake-keylogger-information-stealers-massively-distributed-via-email-using-relicrace-and-relicsource-malware\/<\/a><br>\",\"id\":\"65fa8ae2-8e2c-4a9a-8115-6834295bf26c\"},{\"content\":\"Packetlabs, <em>TA558 \u201cSteganoAmor\u201d uses steganography targeting unpatched MS\u2011Office apps<\/em>, disponible en l\u00ednea en <a href=\\\"https:\/\/www.packetlabs.net\/posts\/ta558-steganoamor-uses-steganography-targeting-unpatched-ms-office-apps\/\\\">https:\/\/www.packetlabs.net\/posts\/ta558-steganoamor-uses-steganography-targeting-unpatched-ms-office-apps\/<\/a><br>\",\"id\":\"6703ce85-913c-42d4-9365-82b9c7f5833a\"},{\"content\":\"Trade.gov, Kazakhstan \u2013 Oil and Gas Equipment and Services, disponible en l\u00ednea en <a class=\\\"\\\" href=\\\"https:\/\/www.trade.gov\/country-commercial-guides\/kazakhstan-oil-gas-equipment-and-services\\\">https:\/\/www.trade.gov\/country-commercial-guides\/kazakhstan-oil-gas-equipment-and-services<\/a>.\",\"id\":\"843f51f6-3ad0-4151-b8f7-3a022485f96a\"}]"},"categories":[21],"tags":[5,8,52],"class_list":{"0":"post-2864","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apt","8":"tag-geopolitics","9":"tag-russia","10":"tag-stealer","11":"entry"},"featured_image_src":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/snake-cuadradaweblab-600x400.jpg","featured_image_src_square":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/06\/snake-cuadradaweblab-600x600.jpg","author_info":{"display_name":"3722304989","author_link":"https:\/\/lab52.io\/blog\/author\/3722304989\/"},"_links":{"self":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/2864"}],"collection":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/comments?post=2864"}],"version-history":[{"count":14,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/2864\/revisions"}],"predecessor-version":[{"id":2899,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/2864\/revisions\/2899"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media\/2896"}],"wp:attachment":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media?parent=2864"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/categories?post=2864"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/tags?post=2864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}