Cybersecurity researchers on Monday said they uncovered evidence of attempted attacks by a Russia-linked hacking operation targeting a Ukrainian entity in July 2021.
Broadcom-owned Symantec, in a new report published Monday, attributed the attacks to an actor tracked as Gamaredon (aka Shuckworm or Armageddon), a cyber-espionage collective known to be active since at least 2013.
In November 2021, Ukrainian intelligence agencies branded the group as a "special project" of Russia's Federal Security Service (FSB), in addition to pointing fingers at it for carrying out over 5,000 cyberattacks against public authorities and critical infrastructure located in the country.
Gamaredon attacks typically originate with phishing emails that trick the recipients into installing a custom remote access trojan called Pterodo. Symantec disclosed that, between July 14, 2021 and August 18, 2021, the actor installed several variants of the backdoor as well as deployed additional scripts and tools.
"The attack chain began with a malicious document, likely sent via a phishing email, which was opened by the user of the infected machine," the researchers said. The identity of the affected organization was not disclosed.
Towards the end of July, the adversary leveraged the implant to download and run an executable file that acted as a dropper for a VNC client before establishing connections with a remote command-and-control server under their control.
"This VNC client appears to be the ultimate payload for this attack," the researchers noted, adding the installation was followed by accessing a number of documents ranging from job descriptions to sensitive company information on the compromised machine.
Ukraine Calls Out False Flag Operation in Wiper Attacks
The findings come amidst a wave of disruptive and destructive attacks levied against Ukrainian entities by alleged Russian state-sponsored actors, resulting in the deployment of a file wiper dubbed WhisperGate, around the same time multiple websites belonging to the government were defaced.
Subsequent investigation into the malware has since revealed that the code used in the wiper was re-purposed from a faux ransomware campaign called WhiteBlackCrypt that was aimed at Russian victims in March 2021.
Interestingly, the ransomware is known to include a trident symbol — that is part of Ukraine's coat of arms — in the ransom note it displays to its victims, leading Ukraine to suspect that this may have been a false flag operation deliberately intended to blame a "fake" pro-Ukrainian group for staging an attack on their own government.
- Best Pentesting Tools 2018
- Hack Tools Pc
- Pentest Tools For Mac
- Kik Hack Tools
- Hacking Tools For Pc
- Pentest Tools Github
- Hack Tools Download
- Pentest Tools Review
- Hack Tools Download
- Bluetooth Hacking Tools Kali
- What Are Hacking Tools
- Hacking Tools 2019
- Hacking App
- Hack Tools Pc
- Install Pentest Tools Ubuntu
- Pentest Automation Tools
- Hacking Tools For Pc
- Hacker Tools Free Download
- Pentest Tools For Mac
- Best Pentesting Tools 2018
- Pentest Tools Subdomain
- Hack Tools Mac
- Hack Tool Apk
- Pentest Tools Website Vulnerability
- Hacking Tools Mac
- Termux Hacking Tools 2019
- Hack Tool Apk No Root
- Best Hacking Tools 2020
- Hackers Toolbox
- Hack Website Online Tool
- Pentest Tools For Android
- Ethical Hacker Tools
- Hack App
- Hacking Tools For Windows
- Pentest Tools Bluekeep
- Hacking Tools Online
- Hacking Tools For Games
- Pentest Tools Linux
- How To Hack
- How To Hack
- Pentest Tools List
- Usb Pentest Tools
- Pentest Tools Website
- Hacking Tools Kit
- Usb Pentest Tools
- Hacker Tools Linux
- Pentest Tools Download
- Hacker Search Tools
- Hack Tools Github
- Pentest Tools Port Scanner
- Free Pentest Tools For Windows
- Hak5 Tools
- Hacking Tools And Software
- Hacker Tools For Mac
- Hacker Tools For Ios
- Hacker Tools For Ios
- World No 1 Hacker Software
- Tools 4 Hack
- Pentest Reporting Tools
- Pentest Tools Subdomain
- Tools Used For Hacking
- Hacker Tools Online
- Hacking Tools For Mac
- Hackrf Tools
- Hackers Toolbox
- Black Hat Hacker Tools
- Pentest Tools Tcp Port Scanner
- Pentest Tools Alternative
- Black Hat Hacker Tools
- Hacking Tools For Windows
- Pentest Tools Find Subdomains
- Pentest Tools Subdomain
- New Hack Tools
- Free Pentest Tools For Windows
- Pentest Tools Alternative
- Pentest Tools Github
- Growth Hacker Tools
- New Hack Tools
- Hack Tools For Pc
- Hacker Tools For Pc
- Hacking Tools For Pc
- Hack Website Online Tool
- Pentest Tools Review
- Pentest Tools Github
- Hak5 Tools
- Hacker Tools 2019
- Hacking Tools Name
- Hackers Toolbox
- Hacking Tools 2020
- Usb Pentest Tools
- Pentest Tools Kali Linux
- Hacker Tools Github
- World No 1 Hacker Software
- Hacking Tools Hardware
- Tools 4 Hack
- Hackers Toolbox
- Hackers Toolbox
- Hack Tools For Windows
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Bluekeep
- Hacker Tools Free Download
- Hacking Tools Pc
- Hack Apps
- Pentest Tools Url Fuzzer
- Hak5 Tools
- Wifi Hacker Tools For Windows
- Pentest Tools Find Subdomains
- Hacking Tools For Windows
- Pentest Recon Tools
- Hack Tools Pc
- Hacker Tools For Pc
- Hacker Tools Online
- Hack Tools Github
- Nsa Hack Tools
- Hack Tools Mac
- Hack And Tools
- Ethical Hacker Tools
- Pentest Tools For Mac
- Hacking Tools Free Download
- Free Pentest Tools For Windows
- Hacking Tools Online
- Black Hat Hacker Tools
- Hacking Tools And Software
- Pentest Tools Linux
- Usb Pentest Tools
- Hack Rom Tools
- Pentest Tools Website Vulnerability
- Usb Pentest Tools
- Hack Tools Mac
- How To Hack
- Hack Website Online Tool
- Hack Tools For Ubuntu
- Hack Tools Download
- Hack Tool Apk
- Hacking Tools Windows
- Hack Rom Tools
- Pentest Tools Port Scanner
- Hacker Tools Linux
- Pentest Tools Windows
- Tools 4 Hack
- Pentest Reporting Tools
- Hacker Tools 2020
- Physical Pentest Tools
- Game Hacking
- Hacker Tools Hardware
- Hacks And Tools
- Pentest Box Tools Download
- Hack Tool Apk No Root
- Hacker Techniques Tools And Incident Handling
- Hack Website Online Tool
- What Are Hacking Tools
- Pentest Tools Subdomain
No hay comentarios:
Publicar un comentario