Awaken Likho

Threat Actor updated 7 days ago (2024-10-09T18:00:54.895Z)
Download STIX
Preview STIX
Awaken Likho, a threat actor group known for its malicious activities, has been active since the onset of the Russo-Ukrainian conflict. The group has adapted its methods over time, recently shifting from using UltraVNC to MeshCentral for remote access. This change was observed in a new campaign that ran from June to August 2024, as discovered by Kaspersky researchers. The group, also known as Core Werewolf and PseudoGamaredon, is notorious for targeting government agencies and industrial entities, primarily within Russia. In September 2024, Awaken Likho was detected utilizing a new implant. However, upon further analysis of the telemetry, it was revealed that the attackers had started using this malware as early as August 2024. This development shows the group's continuous evolution and adaptation of their tools and tactics to stay ahead of cybersecurity defenses. The group has now adopted a more sophisticated technique involving a 7-Zip self-extracting archive. This method displays a decoy document while covertly installing the MeshAgent tool, thereby misleading victims and evading detection. Given these developments, Awaken Likho is expected to continue targeting and infiltrating selected infrastructure in future attacks, posing a significant threat to cybersecurity.
Description last updated: 2024-10-09T17:15:50.776Z
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Awaken Likho Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more