Cybersecurity researchers on Monday said they uncovered evidence of attempted attacks by a Russia-linked hacking operation targeting a Ukrainian entity in July 2021.
Broadcom-owned Symantec, in a new report published Monday, attributed the attacks to an actor tracked as Gamaredon (aka Shuckworm or Armageddon), a cyber-espionage collective known to be active since at least 2013.
In November 2021, Ukrainian intelligence agencies branded the group as a "special project" of Russia's Federal Security Service (FSB), in addition to pointing fingers at it for carrying out over 5,000 cyberattacks against public authorities and critical infrastructure located in the country.
Gamaredon attacks typically originate with phishing emails that trick the recipients into installing a custom remote access trojan called Pterodo. Symantec disclosed that, between July 14, 2021 and August 18, 2021, the actor installed several variants of the backdoor as well as deployed additional scripts and tools.
"The attack chain began with a malicious document, likely sent via a phishing email, which was opened by the user of the infected machine," the researchers said. The identity of the affected organization was not disclosed.
Towards the end of July, the adversary leveraged the implant to download and run an executable file that acted as a dropper for a VNC client before establishing connections with a remote command-and-control server under their control.
"This VNC client appears to be the ultimate payload for this attack," the researchers noted, adding the installation was followed by accessing a number of documents ranging from job descriptions to sensitive company information on the compromised machine.
Ukraine Calls Out False Flag Operation in Wiper Attacks
The findings come amidst a wave of disruptive and destructive attacks levied against Ukrainian entities by alleged Russian state-sponsored actors, resulting in the deployment of a file wiper dubbed WhisperGate, around the same time multiple websites belonging to the government were defaced.
Subsequent investigation into the malware has since revealed that the code used in the wiper was re-purposed from a faux ransomware campaign called WhiteBlackCrypt that was aimed at Russian victims in March 2021.
Interestingly, the ransomware is known to include a trident symbol — that is part of Ukraine's coat of arms — in the ransom note it displays to its victims, leading Ukraine to suspect that this may have been a false flag operation deliberately intended to blame a "fake" pro-Ukrainian group for staging an attack on their own government.
- Hacker Tools Github
- Install Pentest Tools Ubuntu
- Pentest Tools Find Subdomains
- Pentest Tools Bluekeep
- Android Hack Tools Github
- Hacking Tools
- Hacker Tools For Mac
- Pentest Tools Review
- Pentest Reporting Tools
- New Hacker Tools
- Hack Website Online Tool
- Hacking Tools Online
- How To Install Pentest Tools In Ubuntu
- Hack Tools Online
- Pentest Tools
- Pentest Tools For Ubuntu
- Termux Hacking Tools 2019
- Hacker Tools For Ios
- Pentest Tools Windows
- Hacking Tools 2019
- Hacker Tools List
- Pentest Tools Download
- Hacking Tools For Kali Linux
- Hacker Tools
- Tools 4 Hack
- Hacker Search Tools
- Hacking Tools 2019
- Pentest Tools Url Fuzzer
- New Hack Tools
- Pentest Reporting Tools
- Pentest Tools
- New Hacker Tools
- Hack Tool Apk No Root
- Hack Tools
- Free Pentest Tools For Windows
- Hacking Tools For Beginners
- Hacking Tools Github
- Hack Tools
- Hacker Tools Hardware
- Hacking Tools Download
- Hacking Tools Kit
- What Is Hacking Tools
- Wifi Hacker Tools For Windows
- Termux Hacking Tools 2019
- Hacking Tools Usb
- Hacking Tools For Games
- Hack Tool Apk No Root
- Hacker Tools Online
- Hack Tool Apk No Root
- Hacker Tools Mac
- Hacking Tools Software
- Hack App
- Hacker Tools For Windows
- Hacking Tools Free Download
- Hack Tools Github
- Pentest Box Tools Download
No comments:
Post a Comment