New Vidar campaign active via PEC: use C2 on Steam and Telegram profiles

The Vidar criminal group is intensifying its operations in Italy, mainly leveraging PEC mailboxes to spread malware. They have introduced new C2 channels via Steam and Telegram profiles, with CERT-AGID countering three campaigns and sharing IoCs with PEC managers. #Vidar #PEC #CERT-AGID #Steam #Telegram

Keypoints

  • Vidar group is expanding its operations in Italy.
  • PEC mailboxes are the primary attack channel.
  • This is the third Vidar campaign observed by CERT-AGID.
  • New tactic includes using Steam and Telegram profiles for command and control.
  • IoCs have been shared with PEC managers and via the CERT-AGID IoC Feed.
  • Users should exercise caution with PEC communications, especially suspicious links.

MITRE Techniques

  • [T1566] Phishing – Using PEC mailboxes to deliver malware. Quote: β€˜Utilizing PEC mailboxes to deliver malware.’
  • [T1071] Command and Control – Using Steam and Telegram for C2 communications. Quote: β€˜Using Steam and Telegram for C2 communications.’
  • [T1566.002] Spearphishing Link – Distributing malware through malicious links in emails. Quote: β€˜Distributing malware through malicious links in emails.’

Indicators of Compromise

  • [URL] IoCs – vidar_pec_26-09-2024.json, and IoC Feed page for broader dissemination. Context: IoCs related to the campaign are provided via official feeds.
  • [Email] [email protected] – Context: contact for forwarding suspicious PEC emails.

Read more: https://cert-agid.gov.it/news/nuova-campagna-vidar-via-pec-c2-su-profili-steam-e-telegram/