Cybersecurity researchers on Monday said they uncovered evidence of attempted attacks by a Russia-linked hacking operation targeting a Ukrainian entity in July 2021.
Broadcom-owned Symantec, in a new report published Monday, attributed the attacks to an actor tracked as Gamaredon (aka Shuckworm or Armageddon), a cyber-espionage collective known to be active since at least 2013.
In November 2021, Ukrainian intelligence agencies branded the group as a "special project" of Russia's Federal Security Service (FSB), in addition to pointing fingers at it for carrying out over 5,000 cyberattacks against public authorities and critical infrastructure located in the country.
Gamaredon attacks typically originate with phishing emails that trick the recipients into installing a custom remote access trojan called Pterodo. Symantec disclosed that, between July 14, 2021 and August 18, 2021, the actor installed several variants of the backdoor as well as deployed additional scripts and tools.
"The attack chain began with a malicious document, likely sent via a phishing email, which was opened by the user of the infected machine," the researchers said. The identity of the affected organization was not disclosed.
Towards the end of July, the adversary leveraged the implant to download and run an executable file that acted as a dropper for a VNC client before establishing connections with a remote command-and-control server under their control.
"This VNC client appears to be the ultimate payload for this attack," the researchers noted, adding the installation was followed by accessing a number of documents ranging from job descriptions to sensitive company information on the compromised machine.
Ukraine Calls Out False Flag Operation in Wiper Attacks
The findings come amidst a wave of disruptive and destructive attacks levied against Ukrainian entities by alleged Russian state-sponsored actors, resulting in the deployment of a file wiper dubbed WhisperGate, around the same time multiple websites belonging to the government were defaced.
Subsequent investigation into the malware has since revealed that the code used in the wiper was re-purposed from a faux ransomware campaign called WhiteBlackCrypt that was aimed at Russian victims in March 2021.
Interestingly, the ransomware is known to include a trident symbol — that is part of Ukraine's coat of arms — in the ransom note it displays to its victims, leading Ukraine to suspect that this may have been a false flag operation deliberately intended to blame a "fake" pro-Ukrainian group for staging an attack on their own government.
Read more
- Pentest Tools Alternative
- Pentest Tools Apk
- Hacking Tools Download
- Pentest Box Tools Download
- Pentest Box Tools Download
- Hack App
- Nsa Hack Tools
- Hacking Tools For Mac
- Hack Tools Pc
- Pentest Tools Framework
- Pentest Tools For Windows
- Hacking Tools For Mac
- Hacking Tools Kit
- Pentest Tools Free
- Termux Hacking Tools 2019
- Hacking Tools
- Hacking Tools For Mac
- Pentest Tools Bluekeep
- Hacking Tools For Mac
- Pentest Tools Download
- Hack Tools Github
- Hack Tools 2019
- Hacker Tools Apk
- Physical Pentest Tools
- Game Hacking
- Android Hack Tools Github
- Hacking Tools Free Download
- Pentest Tools Url Fuzzer
- Hacking Tools For Pc
- New Hack Tools
- Hack Tools For Pc
- Termux Hacking Tools 2019
- Hacking Tools Kit
- Termux Hacking Tools 2019
- Pentest Tools Find Subdomains
- Hacker Tools Hardware
- Hacking Tools For Pc
- Underground Hacker Sites
- Hackers Toolbox
- Hacker Tools 2020
- Tools 4 Hack
- Hacker Tools Apk
- Hack Tools Mac
- Pentest Tools Website Vulnerability
- Hack Tools Github
- Hacker Tools Free
- Hack Rom Tools
- Hacking Tools For Windows
- Hacking App
- Hacker Tools Software
- Hackers Toolbox
- Hacking Tools Github
- Hack Rom Tools
- Pentest Tools Open Source
- Pentest Tools Tcp Port Scanner
- Install Pentest Tools Ubuntu
- Hacking Apps
- New Hacker Tools
- Hacking Tools Online
- Pentest Automation Tools
- Bluetooth Hacking Tools Kali
- Hackers Toolbox
- Pentest Tools For Windows
0 件のコメント:
コメントを投稿