Article Details

Scrape Timestamp (UTC): 2023-09-25 13:06:02.117

Source: https://thehackernews.com/2023/09/ukrainian-military-targeted-in-phishing.html

Original Article Text

Click to Toggle View

Ukrainian Military Targeted in Phishing Campaign Leveraging Drone Manuals. Ukrainian military entities are the target of a phishing campaign that leverages drone manuals as lures to deliver a Go-based open-source post-exploitation toolkit called Merlin. "Since drones or Unmanned Aerial Vehicles (UAVs) have been an integral tool used by the Ukrainian military, malware-laced lure files themed as UAVs service manuals have begun to surface," Securonix researchers Den Iuzvyk, Tim Peck, and Oleg Kolesnikov said in a report shared with The Hacker News. The cybersecurity company is tracking the campaign under the name STARK#VORTEX. The starting point of the attack is a Microsoft Compiled HTML Help (CHM) file that, when opened, runs malicious JavaScript embedded inside one of the HTML pages to execute PowerShell code designed to contact a remote server to fetch an obfuscated binary. The Windows-based payload is decoded to extract the Merlin Agent, which, in turn, is configured to communicate with a command-and-control (C2) server for post-exploitation actions, effectively seizing control over the host. "While the attack chain is quite simple, the attackers leveraged some pretty complex TTPs and obfuscation methods in order to evade detection," the researchers said. This is the first time Ukrainian government organizations have been targeted using Merlin. In early August 2023, the Computer Emergency Response Team of Ukraine (CERT-UA) disclosed a similar attack chain that employs CHM files as decoys to infect the computers with the open-source tool. CERT-UA attributed the intrusions to a threat actor it monitors under the name UAC-0154. "Files and documents used in the attack chain are very capable of bypassing defenses," the researchers explained. Ready to tackle new AI-driven cybersecurity challenges? Join our insightful webinar with Zscaler to address the growing threat of generative AI in cybersecurity. "Typically receiving a Microsoft help file over the internet would be considered unusual. However, the attackers framed the lure documents to appear as something an unsuspecting victim might expect to appear in a help-themed document or file." The development arrives weeks after the CERT-UA said it detected an unsuccessful cyber attack against an unnamed critical energy infrastructure facility in the country undertaken by the Russian state-sponsored crew called APT28.

Daily Brief Summary

NATION STATE ACTIVITY // Ukrainian Military Entities Targeted by Phishing Campaign Deploying Drone Manuals

Ukrainian military bodies have been targeted in a phishing strategy that leverages drone manuals to deliver a commonly-used, Go-based, open-source post-exploitation toolkit known as Merlin.

Phishing documents posing as drone service manuals have emerged, reflecting the crucial role that drones play in the Ukrainian military.

Cybersecurity firm Securonix tracks this campaign under STARK#VORTEX, and their research reveals that the attack begins with a Microsoft Compiled HTML Help (CHM) file. When opened, it executes malicious JavaScript coded into one of the HTML pages, leading to a contact with a remote server to fetch an obfuscated binary.

The obfuscated binary is then decoded to reveal the Merlin Agent. Once active, the software connects to a command-and-control (C2) server for post-exploitation actions, enabling the attacker to control the host device.

This represents the first time that Merlin has been used to target Ukrainian government bodies.

The Ukraine Computer Emergency Response Team (CERT-UA) has previously reported similar attack chains utilizing CHM files as decoys to infect computers with open-source tools. CERT-UA attribute these attacks to a threat actor it tracks as UAC-0154.

The malicious activity comes after CERT-UA detected an unsuccessful cyber attack against a key energy infrastructure facility in Ukraine, attributing the attack to APT28, a Russian state-sponsored group.