<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><div><img src="https://info.threatstop.com/hubfs/Machete%20Opt%20Resize.jpg" alt="Machete Opt Resize" style="display: block; margin-left: auto; margin-right: auto;"></div> <p>In the rapid cycle rise and disappearance of malware campaigns, there are only a few campaigns that last for several years. One of these, is the <strong>El Machete malware</strong>, which was first discovered by <a href="https://securelist.com/66108/el-machete/">Kaspersky</a>, and is thought to have been active since 2010.<!--more--></p> <p><a href="https://www.cylance.com/en_us/blog/el-machete-malware-attacks-cut-through-latam.html">Cylance</a> reported on recent activity from this campaign, and presented evidence that El Machete's targets include intelligence services, military, embassies and government institutions, mainly in South America and a few targets in Russia and Europe.</p> <p>Research on the malware shows it to have keystroke logging, audio and video capture, plus the ability to capture screenshots, geolocation data, and other sensor inputs.</p> <p>Distribution of the malware relies on phishing emails which include links to external ZIP or RAR archives. These contain an executable with the extension .SCR. Most of the SCR files found recently in the campaign were named in Spanish, for example <strong>LISTA DEL RADG N° 0931208.scr</strong>.</p> <p>The malware's executables are written as Python scripts and are only compatible with the Python v2.7 interpreter. The delivery of data from the infected machine is performed over TCP protocol on port 21 (FTP), after the files were encrypted using a predefined <a href="https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation">AES-CBC</a> encryption key.</p> <p>Enabling the <strong>TSCritical</strong> targets in your user policy will add protection against El Machete to your ThreatSTOP DNS and IP Firewall Services. If you do not have a ThreatSTOP account&nbsp; to try a demo.</p> <p>If you do have a ThreatSTOP account, instructions to add targets to <a href="http://dochub.threatstop.com/display/TS/ThreatSTOP+DNS+Firewall#ThreatSTOPDNSFirewall-DNSFWPolicy">DNS</a> or <a href="http://dochub.threatstop.com/display/TS/ThreatSTOP+IP+Firewall">IP</a> Firewall policies are available on the ThreatSTOP Documentation Hub. Or contact our&nbsp; team.</p></span>