<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Maltrail — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/maltrail/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 15 Mar 2026 21:00:08 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/maltrail/feed.xml" rel="self" type="application/rss+xml"/><item><title>Maltrail IOC Feed Update for Multiple Threats</title><link>https://feed.craftedsignal.io/briefs/2026-03-maltrail-iocs/</link><pubDate>Sun, 15 Mar 2026 21:00:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-maltrail-iocs/</guid><description>This brief summarizes IOCs extracted from the Maltrail feed on March 15, 2026, covering domains and URLs associated with threats targeting macOS and Android platforms, including OSX_Atomic, FakeApp, Android_Joker, Lummack2, APT_Sidewinder, APT_Kimsuky, and Hak5Cloud_C2.</description><content:encoded><![CDATA[<p>This threat brief highlights indicators of compromise (IOCs) identified on March 15, 2026, through the Maltrail feed. The identified IOCs are associated with a variety of threat actors and malware families, targeting both macOS and Android operating systems. The threats include OSX_Atomic, which potentially delivers malware to macOS systems; FakeApp, used for deceptive applications; Android_Joker, a known Android malware family; Lummack2, an information stealer; APT_Sidewinder, an advanced persistent threat actor; APT_Kimsuky, another APT group; and Hak5Cloud_C2, related to Hak5 Cloud Command and Control infrastructure. This diverse set of IOCs underscores the wide range of threats organizations face and the importance of monitoring network traffic and system logs for malicious activity. This data is crucial for detection engineers to build and deploy relevant detection rules to protect their environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access (OSX_Atomic/FakeApp):</strong> User downloads a seemingly legitimate application from a compromised website (e.g., <code>appsformacs.com</code>, <code>torrents4mac.com</code>, or a FakeApp site like <code>adhushapp-razvd.com</code>).</li>
<li><strong>Execution (OSX_Atomic/FakeApp):</strong> The downloaded application is executed on the user&rsquo;s macOS or Android device. This may involve bypassing security warnings or exploiting vulnerabilities.</li>
<li><strong>Persistence (OSX_Atomic/Android_Joker):</strong> The malware establishes persistence on the system, potentially using techniques such as modifying startup items or scheduled tasks (OSX_Atomic), or registering as a background service (Android_Joker).</li>
<li><strong>Command and Control (Multiple):</strong> The malware connects to a command-and-control (C2) server (e.g., <code>c2.socops.net</code>, <code>onev.online</code>) to receive instructions and exfiltrate data.</li>
<li><strong>Credential Theft (Lummack2):</strong> The malware attempts to steal credentials stored on the system or in web browsers, potentially using keylogging or form grabbing techniques (Lummack2).  Observed communicating with <code>police-center.vg</code>.</li>
<li><strong>Data Exfiltration (Multiple):</strong> Sensitive data, such as credentials, financial information, or personal data, is exfiltrated to the C2 server.</li>
<li><strong>Lateral Movement (APT_Sidewinder/APT_Kimsuky):</strong> The attacker uses the compromised system to move laterally within the network, targeting other systems and data.  APT_Sidewinder uses domains like <code>visa.nadra.gov-pk.info</code> while APT_Kimsuky leverages <code>naver.liferod.com</code> for potential C2 or phishing activities.</li>
<li><strong>Impact (Multiple):</strong> The attacker achieves their objectives, which may include financial gain (through fraud or extortion), intellectual property theft, or espionage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The identified IOCs represent a diverse range of threats that can have significant impact on organizations and individuals. Successful attacks can lead to financial losses due to fraud or ransomware, data breaches resulting in the theft of sensitive information, and reputational damage. The targeting of macOS and Android devices indicates a broad scope of potential victims, encompassing both corporate and personal devices. The involvement of APT groups like APT_Sidewinder and APT_Kimsuky suggests potential for targeted attacks with significant impact on national security or critical infrastructure. A single successful infection can lead to widespread compromise within an organization&rsquo;s network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Block the malicious domains listed in the IOC table at the DNS resolver and firewall to prevent communication with known C2 infrastructure.</li>
<li>Implement a network intrusion detection system (NIDS) rule to detect connections to the malicious domains and URLs (IOCs) to identify potentially compromised systems.</li>
<li>Deploy the Sigma rules provided below to your SIEM and tune them for your specific environment to detect suspicious process execution and network connections.</li>
<li>Investigate systems communicating with any of the listed IOCs (domains/URLs) for signs of malware infection or unauthorized access.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>maltrail</category><category>ioc</category><category>osx</category><category>android</category><category>apt</category></item><item><title>Maltrail IOCs Report: Tracking Multiple Threat Actors</title><link>https://feed.craftedsignal.io/briefs/2026-02-maltrail-iocs/</link><pubDate>Fri, 27 Feb 2026 23:00:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-maltrail-iocs/</guid><description>This brief analyzes IOCs aggregated by Maltrail on February 27, 2026, highlighting network activity associated with diverse threat actors including APT_UNC2465, Lazarus Group, Gorat, APT_Bitter, Android_Joker, PowerShell Injector, SmokeLoader, and FakeApp campaigns targeting various sectors.</description><content:encoded><![CDATA[<p>This threat brief is based on an IOC feed from Maltrail, dated February 27, 2026, which aggregates indicators related to various threat actors and malware campaigns. The tracked actors include APT_UNC2465, Lazarus Group, Gorat, APT_Bitter, Android_Joker, PowerShell Injector, SmokeLoader, and FakeApp. The IOCs primarily consist of domains and IP addresses associated with these groups&rsquo; network infrastructure and malware distribution. These campaigns are likely targeting a wide range of victims across multiple sectors, employing diverse techniques to achieve their objectives, including initial access, command and control, and potentially data exfiltration or deployment of malicious payloads. The data suggests ongoing malicious activity necessitating proactive monitoring and detection efforts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An unsuspecting user visits a compromised website or interacts with a malicious advertisement, potentially leading to the download of a malware loader such as those associated with SmokeLoader or FakeApp.</li>
<li><strong>Malware Installation:</strong> The initial loader executes on the victim&rsquo;s system, establishing persistence and preparing the environment for further malicious activities. This may involve creating scheduled tasks or modifying registry keys for auto-start.</li>
<li><strong>Command and Control (C2) Communication:</strong> The malware establishes communication with a command-and-control server, using domains such as <code>dax.estate</code> (SmokeLoader) or <code>resistantmusic.shop</code> (PowerShell Injector) to receive instructions and transmit data.</li>
<li><strong>PowerShell Injection:</strong> The PowerShell Injector, utilizes multiple techniques to inject malicious code into running processes, allowing it to evade detection and maintain persistence within the system. Domains such as <code>apostile.zapto.org</code> and <code>googletranslate.zapto.org</code> may resolve to infrastructure involved in command and control of compromised hosts.</li>
<li><strong>Lateral Movement:</strong> The attackers leverage compromised systems to move laterally within the network, potentially using stolen credentials or exploiting vulnerabilities to gain access to additional systems.</li>
<li><strong>Data Exfiltration:</strong> Sensitive data is collected from compromised systems and exfiltrated to attacker-controlled servers, potentially using domains such as <code>ashersoftlib.com</code> (APT_Bitter) for staging or exfiltration.</li>
<li><strong>Android Exploitation:</strong> In the case of Android_Joker, malicious applications distributed through unofficial channels or app stores communicate with <code>petitle.cloud</code> for command and control, potentially leading to data theft or installation of further malware.</li>
<li><strong>Final Objective:</strong> The final objective of the attack may vary depending on the actor and the target, ranging from data theft and espionage (APT_UNC2465, Lazarus Group, APT_Bitter) to financial gain (Android_Joker) or widespread malware distribution (SmokeLoader, FakeApp, PowerShell Injector).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised systems can be used for a variety of malicious purposes, including data theft, financial fraud, and further propagation of malware. Victims may experience data breaches, financial losses, and reputational damage. The wide range of threat actors involved suggests that various sectors and organizations are at risk. If successful, these attacks can lead to significant financial losses and disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Block the identified malicious domains and IP addresses at the network perimeter to prevent communication with command-and-control servers (IOC table).</li>
<li>Implement a web proxy filter to block access to URLs associated with malware downloads and phishing campaigns (IOC table).</li>
<li>Monitor network traffic for connections to known malicious domains and IP addresses associated with APT_Bitter, PowerShell Injector, SmokeLoader, and FakeApp (IOC table).</li>
<li>Deploy the Sigma rule to detect network connections to domains associated with PowerShell Injector infrastructure. Tune the rule for your environment (Sigma Rule).</li>
<li>Deploy the Sigma rule to detect network connections to infrastructure associated with FakeApp campaigns, adjusting the rule as needed for your environment (Sigma Rule).</li>
<li>Investigate and remediate any systems that exhibit suspicious network activity or have been identified as compromised based on the IOCs provided (IOC table).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>maltrail</category><category>threat-intelligence</category><category>apt</category><category>malware</category></item></channel></rss>