Sandman      , an unidentified threat actor, has been identified as the perpetrator of cyber attacks targeting telecommunications providers in the Middle East , Western Europe     , and the South Asian subcontinent   . This individual or group is suspected to be an espionage-focused actor, possibly a private contractor or mercenary organization , aiming to gather sensitive data from telcos .
Sandman employs stealthy lateral movements and minimal interactions to avoid detection in their attacks . They utilize a modular backdoor called LuaDream , which is built on the LuaJIT platform . LuaDream is believed to be a variant of a new malware strain known as DreamLand and utilizes the Lua scripting language and JIT compiler to execute difficult-to-detect malicious code . The source code of the implant suggests that preparatory work has been ongoing for over a year.
LuaDream is responsible for stealing administrative credentials and conducting reconnaissance to breach workstations and deliver the malware . It is a highly organized and evolving project with advanced capabilities for exfiltrating data and managing attacker-provided plugins . Sandman’s true identity remains unknown, highlighting the need for collaboration and information sharing in the cybersecurity community .
LuaDream is a modular  , multi-protocol backdoor that exfiltrates system and user information and communicates via command-and-control using the WebSocket protocol . Sandman’s activities and the use of complex malware indicate a motivated and capable adversary . The LuaDream staging chain is designed to evade detection and deploy the malware directly into memory .
Similar to other mysterious threat actors like Metador , Sandman has targeted telcos across a wide geographical region . This demonstrates the continuous innovation and advancement efforts of cyber espionage threat actors in developing their malware arsenal . Sandman operates covertly to gain long-term access to breached systems for cyberespionage purposes . They gain initial access to corporate networks using stolen administrative credentials and employ “pass-the-hash” attacks to authenticate to remote servers and services . Sandman has shown particular interest in privileged or confidential information , often targeting managerial personnel .
LuaDream      , the malware used by Sandman , is a new and actively developed modular malware that collects data and executes plugins received from a command and control server . The malware’s staging process involves sophisticated anti-analysis measures to evade detection . LuaDream consists of 34 components, with core components handling primary functions and support components dealing with technical aspects .
The true identity of Sandman remains a mystery , but their activities and the use of complex malware highlight the need for increased collaboration and information sharing in the cybersecurity community. Telcos continue to be prime targets for APTs, showcasing the ongoing efforts of cyber espionage threat actors in developing their malware capabilities. Mitigating the threat posed by Sandman and similar actors requires a proactive approach and continuous innovation in cybersecurity measures.