Skip to content
  Tuesday 28 November 2023
  • Home
  • Cloud
  • Data
  • Cybersecurity
    • Attack
    • Malware
  • Technology
  • Home
  • Cloud
  • Data
  • Cybersecurity
    • Attack
    • Malware
  • Technology
Trending
September 26, 2023The High Tech Industry Targeted the Most with 46% of NLX-Tagged Attack Traffic November 16, 2022Qatar’s World Cup Apps Pose Privacy Concerns September 3, 2022This couple had an Amazon-themed wedding to celebrate how e-commerce brought them together June 9, 2023How to Get Buy-In From the Top December 9, 2022Getaround stock crashes after carsharing company goes public in SPAC deal April 3, 2023Apple CEO Tim Cook explains why people might want a mixed reality headset August 30, 202210 things you need to know to build a small business website October 2, 2023It’s ‘really the Google web’: Microsoft CEO testifies about how hard it is to break into search March 2, 2023Critical Flaw in Cisco IP Phone Series Exposes Users to Command Injection Attack April 19, 2022Fintechs are under pressure to stop Russian sanctions evasion. This start-up raised $94 million to help
  • Home
  • Cloud
  • Data
  • Cybersecurity
    • Attack
    • Malware
  • Technology
  • Home
  • Cloud
  • Data
  • Cybersecurity
    • Attack
    • Malware
  • Technology
  Attack  Cyber Attacks Strike Ukraine’s State Bodies in Espionage Operation
Attack

Cyber Attacks Strike Ukraine’s State Bodies in Espionage Operation

adminadmin—May 24, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail


May 24, 2023Ravie LakshmananCyber War / Threat Intel

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks targeting state bodies in the country as part of an espionage campaign.

The intrusion set, attributed to a threat actor tracked by the authority as UAC-0063 since 2021, leverages phishing lures to deploy a variety of malicious tools on infected systems. The origins of the hacking crew are presently unknown.

In the attack chain described by the agency, the emails targeted an unspecified ministry and purported to be from the Embassy of Tajikistan in Ukraine. It’s suspected that the messages were sent from a previously compromised mailbox.

The emails come attached with a Microsoft Word document that, upon enabling macros, launches an encoded VBScript called HATVIBE, which is then used to drop additional malware.

This includes a keylogger (LOGPIE), a Python-based backdoor capable of running commands sent from a remote server (CHERRYSPY), and a tool focused on exfiltrating files with specific extensions (STILLARCH or DownEx).

More stories

North Korean Kimsuky Hackers Strike Again with Advanced Reconnaissance Malware

May 23, 2023

Worok Hackers Abuse Dropbox API to Exfiltrate Data via Backdoor Hidden in Images

November 14, 2022

Over 100,000 Stolen ChatGPT Account Credentials Sold on Dark Web Marketplaces

June 20, 2023

Hackers Using CAPTCHA Bypass Tactics in Freejacking Campaign on GitHub

January 6, 2023

It’s worth noting that DownEx was recently documented by Bitdefender as being used by an unknown actor in highly targeted attacks aimed at government entities in Kazakhstan and Afghanistan.

“Additional study of the infrastructure and related files made it possible to conclude that among the objects of interest of the group are organizations from Mongolia, Kazakhstan, Kyrgyzstan, Israel, [and] India,” CERT-UA said.

The findings show that some threat actors are still employing macro-based malware despite Microsoft disabling the feature by default in Office files downloaded from the web.

That said, Microsoft’s restrictions have led several attack groups to experiment and adapt their attack chains and payload delivery mechanisms to include uncommon file types (CHM, ISO, LNK, VHD, XLL, and WSF) and techniques like HTML smuggling.

UPCOMING WEBINAR

Zero Trust + Deception: Learn How to Outsmart Attackers!

Discover how Deception can detect advanced threats, stop lateral movement, and enhance your Zero Trust strategy. Join our insightful webinar!

Save My Seat!

Enterprise security firm Proofpoint said it observed multiple initial access brokers (IABs) – actors who infiltrate major targets and then sell that access to other cybercriminals for profit – using PDF and OneNote files starting in December 2022.

“The experimentation with and regular pivoting to new payload delivery techniques by tracked threat actors, especially IABs, is vastly different from attack chains observed prior to 2022 and heralds a new normal of threat activity,” the company said.

“No longer are the most experienced cybercriminal actors relying on one or a few techniques, but rather are frequently developing and iterating new TTPs. The rapid rate of change for many threat actors suggests they have the time, capability, and understanding of the threat landscape to rapidly develop and execute new techniques.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

admin

N. Korean Lazarus Group Targets Microsoft IIS Servers to Deploy Espionage Malware
Legion Malware Upgraded to Target SSH Servers and AWS Credentials
Related posts
  • Related posts
  • More from author
Attack

Hackers Can Exploit ‘Forced Authentication’ to Steal Windows NTLM Tokens

November 28, 20230
Attack

Design Flaw in Google Workspace Could Let Attackers Gain Unauthorized Access

November 28, 20230
Attack

Transform Your Data Security Posture – Learn from SoFi’s DSPM Success

November 28, 20230
Load more
Whoops, it looks like you forgot to specify a form to display.
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Malware

DP World Says Australian Employees’ Data Stolen in Attack

November 28, 20230
Malware

Live Webinar | Unlocking Cloud Security Agility with Credit-Based LicensingWebinar.

November 28, 20230
Malware

Mapping Access – and Attack

November 28, 20230
Malware

Proofpoint Snags Former VMware President Sumit Dhawan as CEO

November 28, 20230
Attack

Hackers Can Exploit ‘Forced Authentication’ to Steal Windows NTLM Tokens

November 28, 20230
Attack

Design Flaw in Google Workspace Could Let Attackers Gain Unauthorized Access

November 28, 20230
Load more

Recent Posts

  • DP World Says Australian Employees’ Data Stolen in Attack
  • Live Webinar | Unlocking Cloud Security Agility with Credit-Based LicensingWebinar.
  • Mapping Access – and Attack
  • Proofpoint Snags Former VMware President Sumit Dhawan as CEO
  • Hackers Can Exploit ‘Forced Authentication’ to Steal Windows NTLM Tokens

    © Copyright 2023, All Rights Reserved