Main Ads

Ad

Cyberattacks Exploit Trusted Platforms to Evade Detection and Paralyze Organizational Systems

8 months ago | Cyber Security


Jakarta, INTI – Cyber threats are becoming increasingly sophisticated and stealthy. Recently, cybersecurity researchers discovered a wave of complex attacks that abuse legitimate platforms such as GitHub, Microsoft Learn Challenge, and social media to infiltrate major organizational networks.

Legitimate Platforms Used as Cyberattack Vectors

Cybercriminals are leveraging widely-used digital services to hide malicious code. By storing malware in public profiles on trusted platforms, attackers can execute harmful code without triggering alerts from conventional security systems.

Once activated, the malware deploys a remote access tool known as Cobalt Strike Beacon. This tool enables attackers to take control of a system, steal data, execute commands remotely, and maintain long-term access within the victim’s network.

Primary Targets: Energy and Tech Industries

These attacks have been active since mid-2024 and are ongoing in 2025, targeting medium to large organizations across China, Japan, Malaysia, Peru, and Russia especially those in strategic sectors like oil and gas.

The attack method typically involves spear-phishing emails disguised as official correspondence from well-known companies. These emails appear to express interest in the victim's products or services and include an attachment posing as a request for proposal. In reality, the file is a disguised executable carrying the malware.

Advanced Techniques and File Manipulation

The malware is hidden using DLL side-loading techniques and abuses legitimate system utilities like the Crash Reporting Send Utility. These methods make detection even harder, as the malware appears to be part of legitimate software.

Attackers also encrypt their malicious code and distribute it through various specially-created accounts on trusted platforms. Some accounts appear to be ordinary users but are intentionally designed to host and spread malware.

Security Alerts and Recommendations

Security experts stress the need for heightened vigilance. While there is no evidence of real social media accounts being used yet, the possibility of attackers abusing public-facing features such as comment sections remains a serious concern.

Organizations are advised to:

  • Continuously monitor their digital infrastructure in real time.
  • Use advanced security solutions capable of detecting and blocking malware early.
  • Train staff to recognize digital threats and suspicious communications.
  • Protect all endpoints with comprehensive cybersecurity systems.

As cyberattacks become more advanced, proactive defense and updated security strategies are no longer optional they are essential.

Conclusion:

Cyber threats are becoming increasingly sophisticated, leveraging trusted digital platforms to covertly distribute malware. These attacks are targeting strategic sectors such as energy and technology through social engineering and advanced, hard-to-detect file techniques. Organizations must enhance security awareness, update their cybersecurity systems, and train human resources to confront increasingly complex attack tactics.

Read More:Google Adds Biometric Feature to Protect Passwords in Chrome for Android

 

Indonesia Technology & Innovation
Advertisement 1