Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network, powered by N2K.
Martin Zujic (0:12)
At Talas, they know cybersecurity can be tough and you can't protect everything. But with Thales, you can secure what matters most. With Thales industry leading platforms, you can protect critical applications, data and identities anywhere and at scale with the highest roi. That's why the most trusted brands and largest banks, retailers and healthcare companies in the world rely on TALAS to protect what matters most, applications, data and identity. That's Talas. T H A L E S learn more@talasgroup.com cyber hello everyone and welcome to the Cyberwires Research Saturday. I'm Dave Buettner and this is our weekly conversation with researchers and analysts tracking down the threats and vulnerabilities, solving some of the hard problems and protecting ourselves in our rapidly evolving cyberspace. Thanks for joining us.
Dave Bittner (1:27)
Is it new activity? Is it existing activity? Is it a cluster of victims or is it isolated case? So in the case of Curly Comrades, we started tracking this group in mid 2024.
Martin Zujic (1:41)
That's Martin Zujic, technical solutions director at Bitdefender. The research we're discussing today is titled Curly Comrades A new threat actor targeting Geopolitical hotbe.
Advertisement Voice (1:57)
Foreign.
Dave Bittner (2:01)
Of those things that people probably don't know. Research like this very often takes months. So it's normal when you see it released, let's say half a year later, that's perfectly fine because we are documenting all the tools they are using, all the segments, the complete infrastructure. We try to get as complete picture as possible before we publish this data. So it's always decision do we want to release this as soon as possible so all the potential victims are informed or do we wait a little bit longer because then we can discover and publish more information and provide more complete picture.
Martin Zujic (2:42)
Yeah, well how about the name itself? I mean Curly Comrades, that's a clever naming here.
Dave Bittner (2:50)
I love the name personally and there are two reasons because we always have like couple of different names that we can choose from. With Curly Comrades I think it is smart name for two reasons. The first reason is it is actually really reflecting the technical details about this threat actor group. They like to use curl exe a lot and at the same time one of the most interesting techniques that we noticed for the persistent access was hijacking the com objects for the engine. So that's where the Curly Comrades the com is capitalized is technically coming from. The second part of the story is I feel we as a security industry are doing kind of disservice by glamorizing the cybercrime, in many cases picking up the names that sounds like gilly, fancy and cool. So what we also wanted to do is we just wanted to point out that these guys are not cool, they are cyber criminals. So we really wanted to find also the name that would reflect what we think about them. If it makes sense.
![Sunny-side spyware. [Research Saturday] - CyberWire Daily cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F8e4cee6a-9aee-11f0-8efb-7b0540705d00%2Fimage%2F95b72a93c2ffaf8ff900d662a9bd3735.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)