Mythic Likho is evolving its toolkit and collaborating with other APT actors
The Cyberthreat Intelligence team at Positive Technologies Expert Security Center (PT ESC TI) has conducted a comprehensive analysis of Mythic Likho, an APT group targeting Russia's critical information infrastructure (CII). The attackers craft unique phishing materials for each victim, using custom malware alongside a wide array of additional tools. To store and deliver malware, the group employs compromised websites of Russian companies and fraudulent sites. Their goal is to encrypt valuable data and demand a ransom for its restoration.
Mythic Likho designs attack scenarios and phishing content based on the victim's operations, location, partners, and employees. The attackers send emails to corporate addresses, impersonating representatives of government agencies, retailers, or media outlets. Notably, the initial emails often lack malicious links; the attackers first establish trust with the recipient. To advance the attack, Mythic Likho uses a combination of compromised legitimate sites and fake sites designed to mimic the victim's industry or masquerade as legitimate services and cloud storage providers.
