HAFNIUM APT Unleashes the Tarrask Malware
An Advanced Persistent Threat (APT) actor tracked under the alias HAFNIUM is operating with a new piece of malware dubbed Tarrask. The Tarrask Malware appears to be a customly developed implant, which is being distributed to vulnerable networks through the use of zero-day vulnerabilities that are yet to be patched. Of course, it is only a matter of time for affected vendors to release critical security fixes, which would severely limit the infection vectors that the Tarrask Malware operators can rely on.
To gain persistence on infected machines, the Tarrask Malware abuses the Windows Task Scheduler service. Typically, its purpose is to enable programs to automate the execution of certain tasks and this, coincidentally, allows malware to gain persistence easily. However, the Tarrask Malware is able to manipulate the scheduled tasks in a more advanced manner in order to conceal their true purpose, as well as to minimize the visible traces left behind. In fact, if the Tarrask Malware is executed from an account with administrator privileges, it could manipulate the Task Scheduler in such a way to make it impossible to discover the bogus scheduled tasks.
The way that the Tarrask Malware manages to utilize Windows features to conceal its presence is fascinating, and shows that the HAFNIUM hackers are well-versed with the Windows operating system. System administrators can ensure protection against the Tarrask Malware by utilizing reputable antivirus solutions, as well as by ensuring that all software and services are patched on a regular basis, thus minimizing the odds of vulnerabilities being exploited.








