{"id":17149,"date":"2019-12-10T10:52:21","date_gmt":"2019-12-10T18:52:21","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/12\/10\/news-10885\/"},"modified":"2019-12-10T10:52:21","modified_gmt":"2019-12-10T18:52:21","slug":"news-10885","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/12\/10\/news-10885\/","title":{"rendered":"VB2019 paper: A study of Machete cyber espionage operations in Latin America"},"content":{"rendered":"<p>Latin America has long been a hotbed for cybercrime, but the region has also seen the activity of various APT groups. One of these groups makes use of &#8216;Machete&#8217;, a Python-based toolset.<\/p>\n<p>Machete dates back at least nine years and was first <a href=\"https:\/\/securelist.com\/el-machete\/66108\/\" target=\"_blank\">written about<\/a> by <em>Kaspersky<\/em> in 2014. In August of this year, <em>ESET<\/em> published <a href=\"https:\/\/www.welivesecurity.com\/2019\/08\/05\/sharpening-machete-cyberespionage\/\" target=\"_blank\">a paper<\/a> on the group&#8217;s recent targeting of Venezuelan government institutions.<\/p>\n<p>For VB2019 in London, Veronica Valeros, Maria Rigaki, Kamila Babayeva and Sebastian Garc\u00eda, researchers from the Stratosphere Lab at the Czech Technical University in Prague, co-wrote a paper on Machete. The paper contains a very in-depth analysis of the tool, looking at the full timespan during which it was developed.<\/p>\n<p>The researchers noted the ability to exfiltrate data through USB devices, suggesting some of the actors using it may have had physical access to the targeted systems. They also looked at decoy documents used by the actors, which gives some insight into the targets.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" src=\"https:\/\/www.virusbulletin.com\/files\/cache\/36ecc2fab21e666bec3b554b9180dcbc_f4363.jpg\" alt=\"Figure 2.jpg\" width=\"800\" height=\"308\" \/><span class=\"centered-caption\">Machete operations are structured in five phases: delivery, installation, action on objectives, lateral movement and exfiltration.<\/span><\/p>\n<p>Today, we have published the researchers&#8217; paper in both <a title=\"VB2019 paper: A study of Machete cyber espionage operations in Latin America\" href=\"https:\/\/www.virusbulletin.com\/virusbulletin\/2019\/12\/vb2019-paper-study-machete-cyber-espionage-operations-latin-america\/\">HTML<\/a> and <a href=\"https:\/\/www.virusbulletin.com\/uploads\/pdf\/magazine\/2019\/VB2019-Valeros-etal.pdf\" target=\"_blank\">PDF <\/a>format. We have also uploaded the video of the presentation, delivered by Veronica and Maria in London, to our <em>YouTube<\/em> channel.<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: center;\" width=\"100%\" height=\"420\"><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/4Hj5OJMW_Ik\" frameborder=\"0\" width=\"100%\" height=\"420\" style=\"\"> <\/iframe><\/p>\n<p>\u00a0<\/p>\n<p>outertext<br \/><a href=\"https:\/\/www.virusbulletin.com\/blog\/2019\/12\/vb2019-paper-study-machete-cyber-espionage-operations-latin-america\/\" target=\"bwo\" >https:\/\/www.virusbulletin.com\/rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.virusbulletin.com\/files\/cache\/36ecc2fab21e666bec3b554b9180dcbc_f4363.jpg\"\/><br \/>                                 At VB2019 in London a group of researchers from the Stratosphere Lab at the Czech Technical University in Prague presented a paper in which they analysed and dissected the cyber espionage activities of an APT group in Latin America through the analysis of one of its tools, known as Machete. Today we publish their paper and the recording of their presentation.                <\/p>\n<p>                 <a href=\"https:\/\/www.virusbulletin.com\/blog\/2019\/12\/vb2019-paper-study-machete-cyber-espionage-operations-latin-america\/\">Read more<\/a>                                <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[23177,10378,23176],"tags":[],"class_list":["post-17149","post","type-post","status-publish","format-standard","hentry","category-magazine","category-security","category-virusbulletin"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17149","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17149"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17149\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17149"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17149"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}