On Tuesday, Symantec reported a continuation of an operation conducted by the Advanced Persistent Threat (APT) group Winnti called Operation CuckooBees. This operation was first reported about in May of this year and has been operating since at least 2019. Winnti, also referred to as APT41, Barium, Blackfly, Bronze Atlas, Double Dragon, and Wicked Panda, typically targets Intellectual Property (IP), focusing on data exfiltration rather than extortion or sabotage. This latest campaign leverages Spyder Loader, which relies on DLL hijacking for execution, to collect information, execute payloads, and facilitate Command and Control (C2) communication. Alongside Spyder Loader, several other tools are deployed, including Mimikatz. The attacks seem to be tailored to the target as well; earlier this year, Winnti attacked Sri Lankan government entities with a separate backdoor, using an ISO image from a Google Drive containing an executable and a .lnk file depicted as a folder.
12 Essentials for a Successful SOC Partnership
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security