Russian state hackers continue to infiltrate Ukraine’s state by deploying information-stealing malware. It is suspected to be an ongoing espionage operation.
The group of hackers was identified as Gamaredon, a Russia-linked cyber threat actor operating since 2013. Gamaredon, also known as Actinium, Armageddon, Primitive Bear, Shuckworm, and Trident Ursa, targets both public and private entities in Ukraine. The group has been a long-time actor in several pro-Russian activities, as Warren Mercer and Vitor Ventura revealed.
Asheer Malhotra and Guilherme Venere, Cisco Talos researchers, had their notable remark on their infamous hacking method. “The adversary is using phishing emails containing lures disguised as related to the Russian invasion of Ukraine,” said Malhotra and Venere.
The operation begins by attracting its victims with a document that provides information about the Russo-Ukrainian War. Once activated, the virus will start its early attacks before running the PowerShell script, which will collect and steal the target’s data and upload it to a remote server.
Malhotra and Venere added that the said malware serves two purposes: it may exfiltrate certain file types and use compromised endpoints to install the other binary and script-based payloads.
The malware’s primary purpose is to siphon data from its target entity, and passwords and other relevant personal information are no exception. This includes all the data saved and accessed by web browsers.
The Ukrainian government, military, and law enforcement employees are typically their targets. Since the attacks started on July 15, 2022, they were first noticed in late August 2022.
Meanwhile, a special report released by Microsoft revealed that state-backed Russian hackers have engaged in “strategic espionage”. This espionage is against 128 targets spanning governments, think tanks, businesses, and aid organisations in 42 countries supporting Kyiv since the start of the war, amid ongoing hacking attempts designed to infect Ukrainian organisations with malware.
Cisco Talos conducts heightened research on techniques for determining whether this malware has attacked your machine. One is to see if a persistently formed register key called “Windows Task” exists under HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run; the other is by checking if no created mutex with the name Global\flashupdate_r is done in the system.
Organisations must be aware of the threat actors most likely to target them. Knowing them can only strategically prevent worse outcomes rather than rebuild what has been lost.
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...