Microsoft Warns of ‘FalseFont’ Malware by APT33 Group

, APT33 FalseFont Malware

Microsoft has sounded the alarm on the discovery of a pernicious cyber threat known as “FalseFont” — a backdoor malware employed by the notorious APT33 group. Commonly referred to as Peach Sandstorm, this Iranian cyber-espionage contingent focuses its sinister operations on the expansive Defense Industrial Base (DIB) sector. The stakes are high; the DIB is a cornerstone of national security, encompassing over 100,000 defense contractors and subcontractors.

For nearly a decade, since 2013, Peach Sandstorm has engaged in sophisticated cyber strikes. Their targets span the globe, with incursions in the United States, Saudi Arabia, and South Korea. They cast a wide net, roping in industries of government, defense, research, finance, and engineering into their web of digital chaos. FalseFont equips its operators with a potent arsenal. It facilitates remote access, seamless file execution, and secure file transfers once a system falls prey. Detected in November 2023, these shadowy transactions bear the unmistakable hallmark of Peach Sandstorm’s machinations.

To stymie the hemorrhaging of data, Microsoft has urged network defenders to buckle down. A reset of compromised account credentials, coupled with the steadfast shield of multi-factor authentication (MFA), is imperative. These safety valves must protect access points, including Remote Desktop Protocol (RDP) and the Windows Virtual Desktop endpoints.

Previously, Microsoft had flagged an insidious password spray attack campaign launched by APT33. This assault method involves repetitive attempts to gain unauthorized access using a swath of common passwords. The campaign’s aftermath was dire—breaches in defense, satellite, and pharmaceutical organizations, culminating in significant data exfiltration.

Meanwhile, Peach Sandstorm is not alone in its cyber onslaught. An advisory through Microsoft’s own defense platform, Microsoft Defender XDR, warns of an additional threat. Flax Typhoon, a China-based actor, shadows Taiwanese organizations, infiltrating systems with deceptive patience. Utilizing legitimate software such as VPNs and open-source malware, Flax Typhoon gains covert access, but, curiously, often refrains from further action.

This developing cyber threat landscape reveals a chilling truth: the battle is ongoing, and vigilance is non-negotiable. Network defenders and organizations must remain proactive, anticipating the next move in this high-stakes game of digital cat and mouse. Cyber resilience hinges on our capacity to stay a step ahead of these invisible yet pervasive adversaries.

If you enjoyed this article, please check out our other articles on CyberNow

December 22, 2023
Microsoft reveals the 'FalseFont' backdoor malware campaign by APT33 targeting the global Defense Industrial Base.