Track Common Adversary Tasks Performed Using Attor

 









To know more about it, you can go through my detailed document by clicking here










Overview

Attor, a Windows-based espionage platform with a complex architecture mainly targets governments and diplomats in Eastern Europe as well as Russian social network users as they seek information related to diplomatic missions and governmental institutions. As its GSM plugin make use of AT command protocol as well as Tor for its network communications, it was named 'Attor'.

Sophisticated Attor

Although its not clear who uses Attor for their malicious purposes, it's pretty much clear that some of the world's most sophisticated espionage players use it as it is made of highly modularized architecture which 'revolves' around a central component called a dispatcher. It also uses encryptions to hide the modules which is rarely seen. It is capable of (but not limited to) performing following tasks:
  1. Take screenshots,
  2.  Record audio,
  3. Upload files to a remote server,
  4. Set up a SOCKS proxy to disguise its traffic,
  5. Set up a keyboard and clipboard logger,
  6. Set up a device monitor, etc.


Prevention

You can protect your devices from such attacks by following these simple steps:
  • Remain Updated
  • Install antivirus software
  • Use antispyware software 
  • Use various firewalls
  • Click everything carefully while online
  • Carefully shop online
  • Share everything carefully on social media

















To know more about it, you can go through my detailed document by clicking here






























Comments

Popular posts from this blog

Query, Visualize, & Monitor Data in Azure Sentinel

Planning for Implementing SAP Solutions on Azure (Part 2 of 5)

Work with String Data Using KQL Statements