Gamaredon APT Targets Ukraine with Infostealer Campaign

  |  Source: 
Cisco Talos

Gamaredon APT Targets Ukraine with Infostealer Campaign

Researchers from Cisco Talos have uncovered an espionage campaign associated with Russian threat group Gamaredon (aka IRON TILDEN, Primitive Bear, ACTINIUM, Armageddon, Shuckworm, and DEV-0157) targeting Ukrainian entities with a new information-stealing malware. Phishing campaigns are used to initiate the attack with a weaponized document containing a malicious macro, to download a RAR archive. The archives will typically contain an LNK file using MSHTA.exe to parse a remote XML file. The execution of a PowerShell script initiating a variety of tasks including system reconnaissance, executing a VBScript object, capturing the victim's screen, setup persistence in the autorun registry key and download the attacker's custom infostealer malware. Cisco Talos has not observed the infostealer deployed by Gamaredon to be used in previous campaigns, with low confidence researchers assess the malware is associated with the group's Giddome backdoor family.

Get trending threats published weekly by the Anvilogic team.

Sign Up Now