An Iranian state-backed hacking group tracked as APT35 (aka Phosphorus or Charming Kitten) is now deploying a new backdoor called PowerLess and developed using PowerShell.
The threat group also used the previously unknown malware to deploy additional modules, including
info stealers and
keyloggers, according to a report published today by the Cybereason Nocturnus Team.
The PowerLess backdoor features encrypted command-and-control communication channels, and it allows executing commands and killing running processes on compromised systems.
It also evades detection by running in the context of a .NET application which allows it to hide from security solutions by not launching a new PowerShell instance.
"The toolset analyzed includes extremely modular, multi-staged malware that decrypts and deploys additional payloads in several stages for the sake of both stealth and efficacy. At the time of writing this report, some of the IOCs remained active delivering new payloads,"
the Cybereason researchers said.