DarkHydrus

Threat Actor updated 4 months ago (2024-05-13T16:17:34.707Z)
Download STIX
Preview STIX
DarkHydrus is a notable threat actor known for executing malicious activities. The group has been associated with several well-known campaigns including DarkHydrus, OilRig, xHunt, SUNBURST, and Decoy Dog. These campaigns have leveraged DNS tunneling for Command and Control (C2) communications, a technique that allows covert extraction of data from compromised systems. Additionally, DarkHydrus has been observed to use Google Drive for C2 communications, highlighting an evolving strategy that involves the abuse of legitimate cloud services. Our research indicates that DarkHydrus recently developed a new variant of the RogueRobin trojan. This variant was discovered in three different delivery documents, suggesting a possible shift in the group's tactics. Notably, this new variant of RogueRobin can utilize Google Drive as its C2 channel, indicating that DarkHydrus is adapting its methods to exploit mainstream cloud services for their operations. Furthermore, these payloads demonstrate that DarkHydrus actors have ported their previous PowerShell-based RogueRobin code to an executable variant, a behavior commonly observed among other adversary groups operating in the Middle East, such as OilRig. The latest activities of DarkHydrus show a persistent evolution in their approach to cyber threats. Recent delivery documents revealed the group's adoption of open-source penetration testing techniques, such as the AppLocker bypass. This development suggests that DarkHydrus continues to enhance its playbook by incorporating new techniques, underscoring the need for ongoing vigilance and adaptive security measures against this active and evolving threat.
Description last updated: 2024-05-13T15:18:54.913Z
What's your take? (Question 1 of 1)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Trojan
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
IDTypeVotesProfile Description
OilRigis related to
2
OilRig is a well-known threat actor in the cybersecurity landscape, notorious for its sophisticated attacks on various targets, including Middle Eastern telecommunications organizations and Israel's critical infrastructure sector. This entity has been linked to several high-profile campaigns such as
Source Document References
Information about the DarkHydrus Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
Unit42
4 months ago
Leveraging DNS Tunneling for Tracking and Scanning
Unit42
a year ago
Understanding DNS Tunneling Traffic in the Wild
MITRE
2 years ago
DarkHydrus delivers new Trojan that can use Google Drive for C2 communications