IBM Security X-Force reports that Iranian government actor MuddyWater used a PowerShell back door known as Aclip to use Slack as a means of attacking airlines. It turned out that these cybercriminals were using the free workspaces in Slack to hide malicious traffic and then commit C2C crimes against airline employees.
This activity was first discovered by MuddyWater Hacking Group in October 2019, when a malicious backdoor called Aclip was first developed. Aclip then executes the command and control over the Slack API to receive data and commands.
After the IBM X-force found the breach, Slack removed the free workspaces used by the backdoor but it is clear that MuddyWater will continue its efforts to use C2C for malicious gains. They must be stopped !! 😡😡
No comments:
Post a Comment