Russia targets Ukrainian conscripts with Windows, Android malware

Russia

A hybrid espionage/influence campaign conducted by the Russian threat group ‘UNC5812’ has been uncovered, targeting Ukrainian military recruits with Windows and Android malware.

According to Google’s threat intelligence, the campaign impersonated a “Civil Defense” persona along with a website and dedicated Telegram channel to distribute malware through a fake recruitment avoidance app dubbed “Sunspinner” by the researchers.

The campaign targets Windows and Android devices using distinct malware for each platform, giving the attackers data theft and real-time spying capabilities.

Google has implemented protections to block the malicious activity, but the operation highlights Russia’s continued use and extensive capabilities in the cyber-warfare space.

Fake “Civil Defense” persona

UNC5812’s persona does not attempt to impersonate Ukraine’s Civil Defense or any government agencies but is instead promoted as a legitimate Ukraine-friendly organization that provides Ukrainian conscripts with helpful software tools and advice.

The persona uses a Telegram channel and a website to engage potential victims and deliver narratives against Ukraine’s recruitment and mobilization efforts, aiming to stir distrust and resistance among the population.

When Google discovered the campaign on September 18, 2024, the “Civil Defense” channel on Telegram had 80,000 members.

Civil Defense channel on Telegram
Civil Defense channel on Telegram
Source: Google

Users tricked into visiting Civil Defense’s website are taken to a download page for a malicious application promoted as a crowd-sourced mapping tool that can help users track the locations of recruiters, and avoid them.

Google calls this app “Sunspinner, and although the app features a map with markers, Google says the data is fabricated. The app’s only purpose is to hide the installation of malware that takes place in the background.

Malicious website spreading malware
Malicious website spreading malware
Source: Google

Dropping Windows and Android malware.

The fake apps offers Windows and Android downloads, and promises to add iOS and macOS soon, so Apple platforms are not supported yet.

The Windows download installs Pronsis Loader, a malware loader that fetches additional malicious payloads from UNC5812’s server, including the commodity info-stealer ‘PureStealer.’

PureStealer targets information stored in web browsers, like account passwords, cookies, cryptocurrency wallet details, email clients, and messaging app data.

On Android, the downloaded APK file drops CraxsRAT, also a commercially available backdoor.

CraxsRAT allows the attackers to track the victim’s location in real time, log their keystrokes, activate audio recordings, retrieve contact lists, access SMS messages, exfiltrate files, and harvest credentials.

To perform these malicious activities undeterred, the app tricks users into disabling Google Play Protect, Android’s in-built anti-malware tool, and manually grant it risky permissions.​

Video containing instructions on how to disable Play Protect
Instructional video on how to disable Play Protect
Source: Google

Google updated Google Play protections to detect and block the Android malware early and also added the domains and files associated with the campaign to its ‘Safe Browsing’ feature on Chrome.

The complete list of indicators of compromise associated with the latest UNC5812 campaign is available here.

Note: This article have been indexed to our site. We do not claim legitimacy, ownership or copyright of any of the content above. To see the article at original source Click Here

Related Posts
9to5Mac Happy Hour Plus: Watching “BlackBerry” thumbnail

9to5Mac Happy Hour Plus: Watching “BlackBerry”

In a 9to5Mac Happy Hour Plus members-only episode, Benjamin and Chance watch BlackBerry, the 2023 film covering the “story of the meteoric rise and catastrophic demise of the world’s first smartphone.”  Subscribe at 9to5Mac.com/join to listen and support the show directly! You’ll also get ad-free episodes, post-show content every week, and more. BlackBerry (2023) on
Read More
その快適さ、もはやグローブのごとし。左右分離型でエルゴノミックなキーボード thumbnail

その快適さ、もはやグローブのごとし。左右分離型でエルゴノミックなキーボード

チェアにもたれながら遠隔入力する映画みたいなヤツできるじゃん!世の中にはキーボードを真っ二つにした、左右分離式の(変態)キーボードなんてジャンルがあります。液晶タブレットなどのデバイスを配置しやすい、猫背になりにくいなどの利点があるのですが、そこにエルゴノミックな要素を追求したら、こんなかたちになっちゃいました。真のキーボードファンのためのキーボードKickstarterにてキャンペーン中の「Glove80」は、人間工学的な快適さをとことん追求した左右分離型キーボード。これ、実際に入力してる様子は本当にグローブみたいに見えますね…。本体はキーエリアが立体的に湾曲していて、親指側には6つずつキーが配置されています。パームレストもついていて、本体を支える4本の足はネジによって高さ調整が可能に。手首を置いた時の姿勢が快適だと、タイピングの疲労も軽減されますからね。また、片手でも使えるので右手で液タブを使いながら左手側のキーボードをショートカットキーとして使う、みたいな運用も。キートップの入れ替えが可能なほか、Chromeブラウザからキーの割り当ての設定変更が可能です。打鍵感を決める軸は白軸、茶軸、赤軸からチョイス可能。もちろん、ゲーミング(光り)ます。アイディア次第では、デスクチェアにスタンドをマウントして両手を肘に置いたまま入力できる安楽椅子探偵スタイルもできちゃう。これロマンすぎるでしょ…! 実際、慣れさえすれば肉体的にはすごくラクかもですね〜。キーボード強者、求む約3万5200円以上の出資すると、リワードとして「Glove80」を受け取れます。キーボード界隈においてもニッチ中のニッチともいえる、左右分離型。我こそはというキーボード探求者は、導入してみてはいかが? Source: Kickstarter
Read More
Index Of News
Total
0
Share