Cannon

Malware updated 4 months ago (2024-05-04T18:18:53.814Z)
Download STIX
Preview STIX
The Cannon malware is a sophisticated and harmful program designed to infiltrate computer systems, often through suspicious downloads, emails, or websites. The actor initiates the attack by sending an email to a specific address with a unique system identifier as the subject and a file path for the Cannon Trojan to save the secondary payload. The malware then logs into a secondary email account via POP3S, searching for emails that match the unique system identifier. It opens the correct email, saves a particular attachment, decodes hexadecimal data within the message to obtain a secondary email account, and acknowledges receipt of this secondary email address by sending a confirmation email from one of three accounts. The Cannon's operations are not intercepted by China's Great Firewall, but they are potentially influenced by another system known as the Great Cannon (GC). This system employs an adversary-in-the-middle approach, altering packets en route to their destination. Meanwhile, advancements in AI technology such as AI translation software, AI-generated narration for videos, chatbots like ChatGPT, and generative AI overall could provide adversaries with an essentially limitless supply of digital cannon fodder, as suggested by a report from the Atlantic Council’s Digital Forensic Research Lab. In the physical realm, "cannon" has been used to describe various incidents, including those involving conflicts between China and the Philippines over disputed territories in the South China Sea. In these instances, Chinese vessels have reportedly fired water cannons at Philippine vessels during resupply missions. Meanwhile, on the domestic front, Kevin McCarthy's alleged interference in the leadership of the Intelligence Committee has led some to question whether the committee will become "cannon fodder" for his political maneuvering.
Description last updated: 2024-04-29T20:15:45.578Z
What's your take? (Question 1 of 0)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
China
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Cannon Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
DARKReading
4 months ago
Muddling Meerkat Poses Nation-State DNS Mystery
CERT-EU
6 months ago
Brute force: Russia ‘doubled down’ on often-crude disinformation in 2023, says report
CERT-EU
8 months ago
Philippines turns to hackers for help as US warns of China cyberthreat
Unit42
10 months ago
Stately Taurus Targets the Philippines As Tensions Flare in the South Pacific
CERT-EU
10 months ago
From Gaza to Ukraine, wars and crises are piling up
CERT-EU
10 months ago
Philippines joins Japan-led naval drills as brushes with China rise in disputed South China Sea
CERT-EU
a year ago
The US Air Force is using satellites and dirt runways to prepare its drones for a different kind of war
CERT-EU
a year ago
After nearly 60 years in flight, US Air Force special operators took their AC-130 gunship to Australia for the first time
CERT-EU
a year ago
BSides Leeds 2023 - Panel: From Failures To Fortresses Unveiling Cybersecurity’s Greatest Missteps And Reinventions
CERT-EU
a year ago
A Conversation With Representative Adam Schiff
CERT-EU
a year ago
Links 25/07/2023: Shotwell 0.32.2 and More Akademy 2023 Reports
CERT-EU
a year ago
Why DeSantis’s congressional fan club is so lonely
CERT-EU
a year ago
Putin and What Really Matters in the Chessboard - Global Research
CERT-EU
a year ago
Trump Judge Aileen Cannon Is A Hack... But Maybe Also A Cowardly Hack? | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
MITRE
2 years ago
New Targeted Attack in the Middle East by APT34, a Suspected Iranian Threat Group, Using CVE-2017-11882 Exploit | Mandiant
MITRE
2 years ago
TA505 shifts with the times | Proofpoint US
MITRE
2 years ago
Sofacy Continues Global Attacks and Wheels Out New ‘Cannon’ Trojan
MITRE
2 years ago
Dear Joohn: The Sofacy Group’s Global Campaign
CERT-EU
2 years ago
Wagner Group Redefined: Threats And Responses – Analysis
CERT-EU
a year ago
Battlefield 2042 Update 4.2.0 Changelog Released | eTeknix