Russian Sandworm hackers targeted 20 critical orgs in Ukraine

Russian Sandworm hackers targeted 20 critical orgs in Ukraine

Russian hacker group Sandworm aimed to disrupt operations at around 20 critical infrastructure facilities in Ukraine, according to a report from the Ukrainian Computer Emergency Response Team (CERT-UA).

Also known as BlackEnergy, Seashell Blizzard, Voodoo Bear, and APT44, the hackers are believed to be associated with Russia’s Main Directorate of the General Staff of the Armed Forces (the GRU), carrying out cyberespionage and destructive attacks on various targets.

CERT-UA reports that in March 2024, APT44 conducted operations to disrupt information and communication systems at energy, water, and heating suppliers in 10 regions of Ukraine.

The attacks occurred in March and in some cases the hackers were able to infiltrate the targeted network by poisoning the supply chain to deliver compromised or vulnerable software, or through the software provider’s ability to access organization’s systems for maintenance and technical support.

Sandworm also combined previously documented malware with new malicious tools (BIASBOAT and LOADGRIP for Linux) to obtain access and move laterally on the network.

CERT-UA experts have confirmed the compromise of at least three “supply chains,” as a result of which the circumstances of the initial unauthorized access either correlate with the installation of software containing backdoors and vulnerabilities or are caused by the regular technical ability of the supplier employees to access the organizations’ ICS for maintenance and technical support. – CERT-UA (machine translated).

The Ukrainian agency notes that Sandworm’s breaches were made easier by the targets’ poor cybersecurity practices (e.g. lack of network segmentation and insufficient defenses at the software supplier level).

From March 7 to March 15, 2024, CERT-UA engaged in extensive counter-cyberattack operations, which included informing affected enterprises, removing malware, and enhancing security measures.

Based on the findings from investigating the logs retrieved from the compromised entities, Sandworm relied on the following malware for its attacks on Ukraine’s utility suppliers:

  • QUEUESEED/IcyWell/Kapeka: C++ backdoor for Windows that collects basic system information and executes commands from a remote server. It handles file operations, command execution, and configuration updates and can delete itself. Communications are secured via HTTPS, and data is encrypted using RSA and AES. It stores its data and maintains persistence on infected systems by encrypting its configuration in the Windows registry and setting up tasks or registry entries for automatic execution.
QUEUESEED scheduled execution
QUEUESEED scheduled execution (CERT-UA)
  • BIASBOAT (new): a Linux variant of QUEUESEED that emerged recently. It is disguised as an encrypted file server and operates alongside LOADGRIP.
  • LOADGRIP (new): also a Linux variant of QUEUESEED developed in C, used to inject a payload into processes using the ptrace API. The payload is usually encrypted, and the decryption key is derived from a constant and a machine-specific ID.
Bash script that loads BIASBOAT and LOADGRIP
Bash script that loads BIASBOAT and LOADGRIP (CERT-UA)
  • GOSSIPFLOW: Go-based malware use on Windows to set up tunneling using the Yamux multiplexer library; it provides SOCKS5 proxy functionality to help exfiltrate data and secure communication with the command and control server.

Additional malicious tools CERT-UA discovered during the investigation are from the open source space and include the Weevly webshell, the Regeorg.Neo, Pitvotnacci, and Chisel tunnelers, LibProcessHider, JuicyPotatoNG, and RottenPotatoNG.

The threat actors used these tools to maintain persistence, hide malicious processes, and elevate their privileges on compromised systems.

The Ukrainian agency belives that the purpose of these attacks was to increase the effect of Russian missile strikes on the targeted infrastructure facilities.

Last week, Mandiant exposed Sandworm’s connection to three hacktivist-branded Telegram groups that have previously claimed attacks on critical infrastructure in Europe and the U.S.

CERT-UA’s report provides a long list of indicators of compromise that includes files, hosts, and network details.

Note: This article have been indexed to our site. We do not claim legitimacy, ownership or copyright of any of the content above. To see the article at original source Click Here

Related Posts
Corsair launches the first monitor in its portfolio, a gaming monitor;  Xeneon 32QHD165 has a 32-inch, 165Hz 1440p screen thumbnail

Corsair launches the first monitor in its portfolio, a gaming monitor; Xeneon 32QHD165 has a 32-inch, 165Hz 1440p screen

Corsair, compania cunoscută mai degrabă pentru componente PC și periferice, trece astăzi la următorul nivel. Firma americană tocmai ce a anunțat lansarea primului monitor din portofoliu, unul de gaming chiar. Se numește Corsair Xeneon 32QHD165 și mai multe detalii avem în rândurile următoare. Noul monitor surprinde prin diagonala de 32 inch și propune rezoluție 1440p,…
Read More
Spec-bumped Samsung Galaxy S22 Ultra on the cards according to latest rumors thumbnail

Spec-bumped Samsung Galaxy S22 Ultra on the cards according to latest rumors

Reviews, News, CPU, GPU, Articles, Columns, Other "or" search relation.3D Printing, 5G, Accessory, AI, Alder Lake, AMD, Android, Apple, ARM, Audio, Biotech, Business, Camera, Cannon Lake, Cezanne (Zen 3), Charts, Chinese Tech, Chromebook, Coffee Lake, Comet Lake, Console, Convertible / 2-in-1, Cryptocurrency, Cyberlaw, Deal, Desktop, E-Mobility, Education, Exclusive, Fail, Foldable, Gadget, Galaxy Note, Galaxy S,…
Read More
MobileCoin reveals Signal-integrated cryptocurrency payments feature has quietly rolled out to international markets thumbnail

MobileCoin reveals Signal-integrated cryptocurrency payments feature has quietly rolled out to international markets

2021 年春,加密通信应用 Signal 宣布将在英国开测支付功能,并且集成对 MobileCoin 的支持。作为一款相对新颖的加密货币,Signal 宣称 MobileCoin 更加注重隐私体验。自去年 11 月中旬以来,该公司已悄然开启更广泛的阶段性测试,让数以百万计的移动设备用户具备了数字支付的能力。 最新消息是,MobileCoind 创始人 Josh Goldbard 已确认正式向国际市场推送 Signal 新支付功能的时间。参考 Signal 的总下载量报告,当前已有上亿台设备能够打开 MobileCoin,并在五秒(或更短的时间)内实现端到端的加密支付。据说当前每日交易量已达数千笔,相比之下,测试阶段的日交易量只有数十笔。即便如此,Signal 的支付功能,用起来还不够便捷。大部分市场区域的 Signal 用户,都可通过点击 + 图标、然后选择‘支付’,以访问他们的 MobileCoin 钱包。除了要等待加密货币钱包的加载,这款加密货币也仅在少数几个规模较小的交易所挂牌(比如 BitFinex 和 FTX),其中没有任何一家是面向美国市场的。与此同时,Signal 方面没有回应外媒的置评请求。不过去年 4 月,Moxie Marlinspike 曾接受过《连线》的采访,期间有解释其希望为 Signal 这款加密视频通话 / 消息应用引入支付功能。显然,此举是为了让 Signal 可在功能上与 WhatsApp 和 Facebook Messenger 等展开直接的竞争,同时让用户享有这款应用广受赞誉的隐私保护特性。
Read More
Toshiba ima za cilj da isporuči čvrste diskove od 30TB do 2023. godine, evo kada će stići 40TB thumbnail

Toshiba ima za cilj da isporuči čvrste diskove od 30TB do 2023. godine, evo kada će stići 40TB

Nemojte otpisivati mehanički hard disk (HDD), ovaj medij za skladištenje ne ide nikuda. Naravno, svi smo oduševljeni neverovatno brzim SSD diskovima (SSD), a prodor na teritoriju PCI Express 5.0 dovešće do još jednog velikog skoka u performansama. Ali što se tiče kapaciteta, HDD-ovi i dalje vladaju. U tom cilju, Toshiba priprema neke velike nadogradnje kapaciteta…
Read More
Index Of News
Total
0
Share