Names | PowerExchange | |
Category | Malware | |
Type | Backdoor | |
Description | (Symantec) PowerShell-based malware that can log into an Exchange Server with hardcoded credentials and monitor for emails sent by the attackers. It uses an Exchange Server as a C&C. Mails received with '@@' in the subject contain commands sent from the attackers which allows them to execute arbitrary PowerShell commands, write files and steal files. The malware creates an Exchange rule (called ‘defaultexchangerules’) to filter these messages and move them to the Deleted Items folder automatically. | |
Information | <https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/crambus-middle-east-government> |
Last change to this tool card: 29 November 2023
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
OilRig, APT 34, Helix Kitten, Chrysene | 2014-Sep 2024 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |