Network Security, Threat Intelligence, Malware

Novel BellaCiao malware variant launched by Charming Kitten

Flag of Iran on binary code

Attacks with an updated C++ variant of the BellaCiao dropper malware dubbed "BellaCPP" have been deployed by Iranian state-backed threat operation Charming Kitten — also known as APT35, CharmingCypress, CALANQUE, Mind Sandstorm, TA453, Newscaster, and Yellow Garuda — to facilitate further payload delivery, according to The Hacker News.

Despite containing a DLL file loading another DLL for SSH tunnel creation, mimicking the "stealthy persistence" of BellaCiao, BellaCPP does not feature the older iteration's web shell leveraged for arbitrary file uploading and downloading, as well as command execution, an analysis from Kaspersky revealed.

"From a high-level perspective, this is a C++ representation of the BellaCiao samples without the web shell functionality," said Kaspersky researcher Mert Degirmenci.

Such a development comes more than a year after BellaCiao was initially discovered by Bitdefender researchers to have been leveraged in attacks targeting organizations in the U.S., India, and the Middle East with vulnerable Microsoft Exchange Server and Zoho ManageEngine instances.

An In-Depth Guide to Network Security

Get essential knowledge and practical strategies to fortify your network security.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds