Russian Sandworm hackers targeted 20 critical orgs in Ukraine

Russian Sandworm hackers targeted 20 critical orgs in Ukraine

Russian hacker group Sandworm aimed to disrupt operations at around 20 critical infrastructure facilities in Ukraine, according to a report from the Ukrainian Computer Emergency Response Team (CERT-UA).

Also known as BlackEnergy, Seashell Blizzard, Voodoo Bear, and APT44, the hackers are believed to be associated with Russia’s Main Directorate of the General Staff of the Armed Forces (the GRU), carrying out cyberespionage and destructive attacks on various targets.

CERT-UA reports that in March 2024, APT44 conducted operations to disrupt information and communication systems at energy, water, and heating suppliers in 10 regions of Ukraine.

The attacks occurred in March and in some cases the hackers were able to infiltrate the targeted network by poisoning the supply chain to deliver compromised or vulnerable software, or through the software provider’s ability to access organization’s systems for maintenance and technical support.

Sandworm also combined previously documented malware with new malicious tools (BIASBOAT and LOADGRIP for Linux) to obtain access and move laterally on the network.

CERT-UA experts have confirmed the compromise of at least three “supply chains,” as a result of which the circumstances of the initial unauthorized access either correlate with the installation of software containing backdoors and vulnerabilities or are caused by the regular technical ability of the supplier employees to access the organizations’ ICS for maintenance and technical support. – CERT-UA (machine translated).

The Ukrainian agency notes that Sandworm’s breaches were made easier by the targets’ poor cybersecurity practices (e.g. lack of network segmentation and insufficient defenses at the software supplier level).

From March 7 to March 15, 2024, CERT-UA engaged in extensive counter-cyberattack operations, which included informing affected enterprises, removing malware, and enhancing security measures.

Based on the findings from investigating the logs retrieved from the compromised entities, Sandworm relied on the following malware for its attacks on Ukraine’s utility suppliers:

  • QUEUESEED/IcyWell/Kapeka: C++ backdoor for Windows that collects basic system information and executes commands from a remote server. It handles file operations, command execution, and configuration updates and can delete itself. Communications are secured via HTTPS, and data is encrypted using RSA and AES. It stores its data and maintains persistence on infected systems by encrypting its configuration in the Windows registry and setting up tasks or registry entries for automatic execution.
QUEUESEED scheduled execution
QUEUESEED scheduled execution (CERT-UA)
  • BIASBOAT (new): a Linux variant of QUEUESEED that emerged recently. It is disguised as an encrypted file server and operates alongside LOADGRIP.
  • LOADGRIP (new): also a Linux variant of QUEUESEED developed in C, used to inject a payload into processes using the ptrace API. The payload is usually encrypted, and the decryption key is derived from a constant and a machine-specific ID.
Bash script that loads BIASBOAT and LOADGRIP
Bash script that loads BIASBOAT and LOADGRIP (CERT-UA)
  • GOSSIPFLOW: Go-based malware use on Windows to set up tunneling using the Yamux multiplexer library; it provides SOCKS5 proxy functionality to help exfiltrate data and secure communication with the command and control server.

Additional malicious tools CERT-UA discovered during the investigation are from the open source space and include the Weevly webshell, the Regeorg.Neo, Pitvotnacci, and Chisel tunnelers, LibProcessHider, JuicyPotatoNG, and RottenPotatoNG.

The threat actors used these tools to maintain persistence, hide malicious processes, and elevate their privileges on compromised systems.

The Ukrainian agency belives that the purpose of these attacks was to increase the effect of Russian missile strikes on the targeted infrastructure facilities.

Last week, Mandiant exposed Sandworm’s connection to three hacktivist-branded Telegram groups that have previously claimed attacks on critical infrastructure in Europe and the U.S.

CERT-UA’s report provides a long list of indicators of compromise that includes files, hosts, and network details.

Note: This article have been indexed to our site. We do not claim legitimacy, ownership or copyright of any of the content above. To see the article at original source Click Here

Related Posts
Apple re-releases Oscar-nominated ‘CODA’ in theaters for free thumbnail

Apple re-releases Oscar-nominated ‘CODA’ in theaters for free

Audiences will get another chance to watch CODA, the first Apple Original movie nominated for an Oscar for Best Picture, in theaters. Apple is re-releasing the film, which is about a deaf family, in a limited run of free screenings with open captions. Directed and written by Sian Heder and featuring a primarily deaf cast,…
Read More
Lumix BS1H: Panasonic brings digital cameras in roll film design thumbnail

Lumix BS1H: Panasonic brings digital cameras in roll film design

Cookies zustimmen Besuchen Sie Golem.de wie gewohnt mit Werbung und Tracking, indem Sie der Nutzung aller Cookies zustimmen. Details zum Tracking finden Sie im Privacy Center. Skript wurde nicht geladen. Informationen zur Problembehandlung finden Sie hier. Um der Nutzung von Golem.de mit Cookies zustimmen zu können, müssen Cookies in Ihrem Browser aktiviert sein. Weitere Informationen…
Read More
BMW teases its latest art car collaboration with Jeff Koons thumbnail

BMW teases its latest art car collaboration with Jeff Koons

2023 Toyota Sequoia debuts bold new look More Galleries 2023 Toyota Sequoia debuts bold new look 57 Photos 2022 Ford Bronco Raptor is ready to catch big air More Galleries 2022 Ford Bronco Raptor is ready to catch big air 55 Photos The 2022 Hyundai Santa Cruz is one cute ute More Galleries The 2022…
Read More
Netflix increases prices in the US – will streaming soon be more expensive in Germany? thumbnail

Netflix increases prices in the US – will streaming soon be more expensive in Germany?

Die weltweite Expansion gibt es für Netflix-Kunden nicht zum Nulltarif. Der Streamingdienst hat ehrgeizige Pläne. 2021 wollte das Unternehmen 17 Milliarden US-Dollar (umgerechnet knapp 15 Milliarden Euro) für neue Filme und Serien ausgeben. Und dieses Geld muss ja irgendwie reinkommen. Das spüren nun Nutzer von Netflix in Nordamerika. Für sie erhöhen sich zum Jahresbeginn die…
Read More
Xiaomi unleashes the Redmi Note 12 series in Malaysia thumbnail

Xiaomi unleashes the Redmi Note 12 series in Malaysia

Xiaomi’s Redmi Note series have always been the undisputed champ in the mid-range phone category, and the company has introduced the Redmi Note 12, Redmi Note 12 5G and the Redmi Note 12 Pro+ 5G to the Malaysian market today. Starting with the Redmi Note 12 Pro+ 5G, it features a powerful 200MP camera with
Read More
Index Of News
Total
0
Share