Article Details
Scrape Timestamp (UTC): 2023-12-28 17:47:12.221
Original Article Text
Click to Toggle View
Russian military hackers target Ukraine with new MASEPIE malware. Ukraine's Computer Emergency Response Team (CERT) is warning of a new phishing campaign that allowed Russia-linked hackers to deploy previously unseen malware on a network in under one hour. APT28, aka Fancy Bear or Strontium, is a Russian state-sponsored threat actor known for targeting government entities, businesses, universities, research institutes, and think tanks in Western countries and NATO orgs. The hacking group is known to employ phishing campaigns and exploit zero-day vulnerabilities in widely used software. The latest campaign targeting Ukraine took place between December 15 and 25, 2023, utilizing phishing emails urging recipients to click on a link supposedly to view an important document. The links redirect victims to malicious web resources that employ JavaScript to drop a Windows shortcut file (LNK) that launches PowerShell commands to trigger an infection chain for a new Python malware downloader called 'MASEPIE.' MASEPIE establishes persistence on the infected device by modifying the Windows Registry and adding a deceptively named LNK file ('SystemUpdate.lnk') to the Windows Startup folder. CERT-UA says the malware's primary role is to download additional malware on the infected device and steal data. The Ukrainian CERT says APT28 also uses a set of PowerShell scripts named 'STEELHOOK' to steal data from Chrome-based web browsers, likely to extract sensitive information like passwords, authentication cookies, and browsing history. Another tool used as part of the attack is the 'OCEANMAP,' a C# backdoor used primarily for executing base64-encoded commands via cmd.exe. OCEANMAP establishes persistence on the system by creating a .URL file named 'VMSearch.url' in the Windows Startup folder. OCEANMAP uses the Internet Message Access Protocol (IMAP) as a control channel to receive commands discreetly that are unlikely to raise alarms, storing them as email drafts containing the command, username, and OS version. After executing the commands, OCEANMAP stores the results in the inbox directory, allowing APT28 to stealthily retrieve the outcomes and adjust their attack if needed. Other tools deployed in the attacks for network reconnaissance and lateral movement include IMPACKET, a collection of Python classes for working with network protocols, and SMBEXEC, which enables remote command execution. Ukraine's CERT says these tools are deployed in compromised systems within an hour from the initial compromise, indicating a rapid and well-coordinated attack.
Daily Brief Summary
Ukraine's Computer Emergency Response Team (CERT) detected a new phishing campaign from Russian state-sponsored hackers using novel MASEPIE malware.
The APT28 group, also known as Fancy Bear, carried out the attacks between December 15 and 25, targeting Ukrainian entities with phishing emails containing malicious links.
The MASEPIE malware downloader establishes persistence on an infected device and leads to additional malware downloads and data theft.
APT28 employs additional tools like STEELHOOK to extract information from Chrome-based browsers and OCEANMAP, a C# backdoor for stealthy command execution.
OCEANMAP employs the IMAP protocol for command and control, using email drafts to issue commands and store results, reducing detection risk.
The attackers also utilized IMPACKET and SMBEXEC for network reconnaissance and lateral movement, indicating a sophisticated and swift attack methodology.
The Ukrainian CERT highlighted the efficiency of the threat actors, being able to deploy these tools and start their attack within an hour of the initial system compromise.