Wednesday, March 22, 2023
AI Home Security
No Result
View All Result
  • Home
  • Home Security
  • Cyber Security
  • Biometric Technology
  • Home
  • Home Security
  • Cyber Security
  • Biometric Technology
No Result
View All Result
Morning News
No Result
View All Result
Home Cyber Security

Gamaredon Group Launches Cyberattacks Against Ukraine Using Telegram

justmattg by justmattg
January 21, 2023
in Cyber Security
0
Gamaredon Group Launches Cyberattacks Against Ukraine Using Telegram
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

READ ALSO

New ‘Bad Magic’ Cyber Threat Disrupt Ukraine’s Key Sectors Amid War

Controlling Third-Party Data Risk Should Be a Top Cybersecurity Priority


Jan 20, 2023Ravie LakshmananCyber War / Cyber Attack

Cyberattacks Against Ukraine

The Russian state-sponsored cyber espionage group known as Gamaredon has continued its digital onslaught against Ukraine, with recent attacks leveraging the popular messaging app Telegram to strike military and law enforcement sectors in the country.

“The Gamaredon group’s network infrastructure relies on multi-stage Telegram accounts for victim profiling and confirmation of geographic location, and then finally leads the victim to the next stage server for the final payload,” the BlackBerry Research and Intelligence Team said in a report shared with The Hacker News. “This kind of technique to infect target systems is new.”

Gamaredon, also known by names such as Actinium, Armageddon, Iron Tilden, Primitive Bear, Shuckworm, Trident Ursa, and Winterflounder, is known for its assaults against Ukrainian entities since at least 2013.

Last month, Palo Alto Networks Unit 42 disclosed the threat actor’s unsuccessful attempts to break into an unnamed petroleum refining company within a NATO member state amid the Russo-Ukrainian war.

Attack chains mounted by the threat actor have employed legitimate Microsoft Office documents originating from Ukrainian government organizations as lures in spear-phishing emails to deliver malware capable of harvesting sensitive information.

These documents, when opened, load a malicious template from a remote source (a technique called remote template injection), effectively getting around the need to enable macros in order to breach target systems and propagate the infection.

The latest findings from BlackBerry demonstrate an evolution in the group’s tactics, wherein a hard-coded Telegram channel is used to fetch the IP address of the server hosting the malware. The IP addresses are periodically rotated to fly under the radar.

To that end, the remote template is designed to fetch a VBA script, which drops a VBScript file that then connects to the IP address specified in the Telegram channel to fetch the next-stage – a PowerShell script that, in turn, reaches out to a different IP address to obtain a PHP file.

This PHP file is tasked with contacting another Telegram channel to retrieve a third IP address that contains the final payload, which is an information-stealing malware that was previously revealed by Cisco Talos in September 2022.

It’s also worth pointing out that the heavily obfuscated VBA script is only delivered if the target’s IP address is located in Ukraine.

“The threat group changes IP addresses dynamically, which makes it even harder to automate analysis through sandbox techniques once the sample has aged out,” BlackBerry pointed out.

“The fact that the suspect IP addresses change only during Eastern European working hours strongly suggests that the threat actor works from one location, and with all probability belongs to an offensive cyber unit that deploys malicious operations against Ukraine.”

The development comes as the Computer Emergency Response Team of Ukraine (CERT-UA) attributed a destructive malware attack targeting the National News Agency of Ukraine to the Russia-linked Sandworm hacking group.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Related Posts

New ‘Bad Magic’ Cyber Threat Disrupt Ukraine’s Key Sectors Amid War
Cyber Security

New ‘Bad Magic’ Cyber Threat Disrupt Ukraine’s Key Sectors Amid War

March 21, 2023
Controlling Third-Party Data Risk Should Be a Top Cybersecurity Priority
Cyber Security

Controlling Third-Party Data Risk Should Be a Top Cybersecurity Priority

March 21, 2023
55 Zero-Day Vulnerabilities Weaponized in 2022
Cyber Security

55 Zero-Day Vulnerabilities Weaponized in 2022

March 21, 2023
Crypto Drainers Are Ready to Ransack Investor Wallets
Cyber Security

Cybersecurity Threats Overhyped or Not?

March 21, 2023
New DotRunpeX Malware Delivers Multiple Malware Families via Malicious Ads
Cyber Security

New DotRunpeX Malware Delivers Multiple Malware Families via Malicious Ads

March 20, 2023
Shouldering the Increasingly Heavy Cloud Shared-Responsibility Model
Cyber Security

Shouldering the Increasingly Heavy Cloud Shared-Responsibility Model

March 20, 2023
Next Post
Amazon, other Pentagon cloud service providers face zero-trust test

Amazon, other Pentagon cloud service providers face zero-trust test

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

POPULAR NEWS

Hackers Create Malicious Dota 2 Game Modes to Secretly Access Players’ Systems

Hackers Create Malicious Dota 2 Game Modes to Secretly Access Players’ Systems

February 13, 2023
Trickbot Members Sanctioned for Pandemic-Era Ransomware Hits

Trickbot Members Sanctioned for Pandemic-Era Ransomware Hits

February 11, 2023
The New Threats to Cryptocurrency Users

The New Threats to Cryptocurrency Users

February 12, 2023
Do you know who is watching you?

Do you know who is watching you?

January 2, 2023
PopID announces big customer deployment for face biometric payments in UAE

PopID announces big customer deployment for face biometric payments in UAE

February 14, 2023

EDITOR'S PICK

ESXiArgs Ransomware Hits Over 500 New Targets in European Countries

ESXiArgs Ransomware Hits Over 500 New Targets in European Countries

February 16, 2023
North Korea’s APT37 Targeting Southern Counterpart with New M2RAT Malware

North Korea’s APT37 Targeting Southern Counterpart with New M2RAT Malware

February 15, 2023
California mountain lion P-22 left mark on wildlife conservation

California mountain lion P-22 left mark on wildlife conservation

January 1, 2023
The Ultimate Guide to Buying Expandable Batons

The Ultimate Guide to Buying Expandable Batons

January 27, 2023

About

We bring you the best news & updates related to Home security, Cyber security and Biometric technology. Keep visiting our website for latest updates.

Follow us

Categories

  • Biometric Technology
  • Cyber Security
  • Home Security

Recent Posts

  • New ‘Bad Magic’ Cyber Threat Disrupt Ukraine’s Key Sectors Amid War
  • Controlling Third-Party Data Risk Should Be a Top Cybersecurity Priority
  • Exploring transformers for behavioral biometrics
  • 55 Zero-Day Vulnerabilities Weaponized in 2022
  • Privacy Policy
  • Contact Us

© 2023 AI Home Security - All rights reserved.

No Result
View All Result
  • Home
  • Home Security
  • Cyber Security
  • Biometric Technology

© 2023 AI Home Security - All rights reserved.