Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 13, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 13, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 13, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 13, 2025

      This $4 Steam Deck game includes the most-played classics from my childhood — and it will save you paper

      May 13, 2025

      Microsoft shares rare look at radical Windows 11 Start menu designs it explored before settling on the least interesting one of the bunch

      May 13, 2025

      NVIDIA’s new GPU driver adds DOOM: The Dark Ages support and improves DLSS in Microsoft Flight Simulator 2024

      May 13, 2025

      How to install and use Ollama to run AI LLMs on your Windows 11 PC

      May 13, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Community News: Latest PECL Releases (05.13.2025)

      May 13, 2025
      Recent

      Community News: Latest PECL Releases (05.13.2025)

      May 13, 2025

      How We Use Epic Branches. Without Breaking Our Flow.

      May 13, 2025

      I think the ergonomics of generators is growing on me.

      May 13, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      This $4 Steam Deck game includes the most-played classics from my childhood — and it will save you paper

      May 13, 2025
      Recent

      This $4 Steam Deck game includes the most-played classics from my childhood — and it will save you paper

      May 13, 2025

      Microsoft shares rare look at radical Windows 11 Start menu designs it explored before settling on the least interesting one of the bunch

      May 13, 2025

      NVIDIA’s new GPU driver adds DOOM: The Dark Ages support and improves DLSS in Microsoft Flight Simulator 2024

      May 13, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Researchers Uncover New Data Theft Campaign of Advanced Threat Actor ‘LilacSquid’

    Researchers Uncover New Data Theft Campaign of Advanced Threat Actor ‘LilacSquid’

    May 31, 2024

    Researchers discovered a new data theft campaign, active since at least 2021, attributed to an advanced persistent threat (APT) actor dubbed “LilacSquid.”

    This campaign, observed by researchers at Cisco Talos, targets a diverse set of industries, including IT organizations in the United States, energy companies in Europe, and pharmaceutical firms in Asia. This broad victimology suggests that LilacSquid is agnostic to industry verticals, aiming to steal data from various sectors.

    Use of Open-Source Tools and Customized Malware

    The campaign from LilacSquid employs MeshAgent, an open-source remote management tool and a customized version of QuasarRAT that researchers refer as “PurpleInk,” as primary implants after compromising vulnerable application servers exposed to the internet.

    LilacSquid exploits public-facing application server vulnerabilities and compromised remote desktop protocol (RDP) credentials to deploy a range of open-source tools and customized malware, including MeshAgent, SSF, PurpleInk, and loaders InkBox and InkLoader.

    LilacSquid’s Long-Term Access for Data Theft through Persistence

    Talos assessed with high confidence that LilacSquid has been active since at least 2021, focusing on establishing long-term access to compromised organizations to siphon valuable data to attacker-controlled servers.

    The campaign has successfully compromised entities in Asia, Europe, and the United States across various sectors such as pharmaceuticals, oil and gas, and technology.

    LilacSquid uses two primary infection chains: exploiting vulnerable web applications and using compromised RDP credentials.

    LilacSquid Initial Access and Activity. (Credit: Cisco Talos)

    Once a system is compromised through exploiting vulnerabilities on internet facing devices, LilacSquid deploys multiple access tools, including MeshAgent, SSF, InkLoader, and PurpleInk.

    LilacSquid’s Lateral Movement via RDP. (Credit: Cisco Talos)

    MeshAgent, downloaded using bitsadmin utility, connects to its command and control (C2) server, conducts reconnaissance, and activates other implants.

    On the other hand InkLoader, a .NET-based malware loader, is used when RDP credentials are compromised. It persists across reboots and executes PurpleInk, with the infection chain tailored for remote desktop sessions.

    PurpleInk Implant of LilacSquid

    PurpleInk, derived from QuasarRAT, has been customized extensively since 2021.
    “Although QuasarRAT has been available to threat actors since at least 2014, we observed PurpleInk being actively developed starting in 2021 and continuing to evolve its functionalities separate from its parent malware family.”
    It features robust remote access capabilities, including process enumeration, file manipulation, system information gathering, remote shell access, and proxy server communication. Different variants of PurpleInk exhibit varying functionalities, with some stripped-down versions retaining core capabilities to evade detection.

    InkBox, an older loader used by LilacSquid, reads from a hardcoded file path on disk, decrypts its contents, and runs PurpleInk. Since 2023, LilacSquid has modularized the infection chain, with PurpleInk running as a separate process via InkLoader.

    PurpleInk Activation Chain (Credit: Cisco Talos)

    Post-exploitation, MeshAgent activates other tools like SSF and PurpleInk. MeshAgent, configured with MSH files, allows operators to control infected devices extensively, managing files, viewing and controlling desktops, and gathering device information.

    Parallels with North Korean APT Groups

    The tactics, techniques, and procedures (TTPs) used in this campaign show similarities to those of North Korean APT groups, such as Andariel and Lazarus. Andariel is known for using MeshAgent to maintain post-compromise access, while Lazarus extensively employs SOCKs proxy and tunneling tools, along with custom malware, to create channels for secondary access and data exfiltration. LilacSquid has similarly deployed SSF and other malware to establish tunnels to their remote servers.

    The LilacSquid campaign highlights the persistent and evolving threat posed by sophisticated APT actors. By leveraging a combination of open-source tools and customized malware, LilacSquid successfully infiltrates and maintains long-term access to diverse organizations worldwide.

    IoCs to detect LilacSquid’s PurpleInk infection:

    PurpleInk: 2eb9c6722139e821c2fe8314b356880be70f3d19d8d2ba530adc9f466ffc67d8

    Network IOCs 

    67[.]213[.]221[.]6

    192[.]145[.]127[.]190

    45[.]9[.]251[.]14

    199[.]229[.]250[.]142

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleOpenAI, Meta, and TikTok Crack Down on Covert Influence Campaigns, Some AI-Powered
    Next Article NoName Ransomware Claims Cyberattacks on Spain and Germany, But Evidence Unclear

    Related Posts

    Databases

    How MongoDB and Google Cloud Power the Future of In-Car Assistants

    May 13, 2025
    Databases

    Amazon CloudWatch Database Insights applied in real scenarios

    May 13, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Animating Letters with Shaders

    Web Development

    Transformer-Based Modulation Recognition: A New Defense Against Adversarial Attacks

    Machine Learning

    Distribution Release: PorteuX 2.0

    News & Updates

    Fidelity Bank Data Breach: Nigerian Bank Denies Allegations, Contests ₦555.8 Million Fine

    Development

    Highlights

    Development

    13 Free AI Courses on AI Agents in 2025

    January 1, 2025

    In the ever-evolving landscape of artificial intelligence, the year 2025 has brought forth a treasure…

    Survey reveals the usage and perception of AI in the overall workforce, beyond just the realm of software development

    August 29, 2024

    Role of the CISO in Private Equity Portfolio Companies

    July 27, 2024

    Warehouse – useful Flatpak tool

    July 8, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.