Article Details
Scrape Timestamp (UTC): 2024-02-22 10:53:35.714
Source: https://thehackernews.com/2024/02/russian-government-software-backdoored.html
Original Article Text
Click to Toggle View
Russian Government Software Backdoored to Deploy Konni RAT Malware. An installer for a tool likely used by the Russian Consular Department of the Ministry of Foreign Affairs (MID) has been backdoored to deliver a remote access trojan called Konni RAT (aka UpDog). The findings come from German cybersecurity company DCSO, which linked the activity as originating from the Democratic People's Republic of Korea (DPRK)-nexus actors targeting Russia. The Konni (aka Opal Sleet, Osmium, or TA406) activity cluster has an established pattern of deploying Konni RAT against Russian entities, with the threat actor also linked to attacks directed against MID at least since October 2021. In November 2023, Fortinet FortiGuard Labs revealed the use of Russian-language Microsoft Word documents to deliver malware capable of harvesting sensitive information from compromised Windows hosts. DCSO said the package of the Konni RAT within software installers is a technique previously adopted by the group in October 2023, when it was found to leverage a backdoored Russian tax filing software named Spravki BK to distribute the trojan. "In this instance, the backdoored installer appears to be for a tool named 'Statistika KZU' (Cтатистика КЗУ)," the Berlin-based company said. "On the basis of install paths, file metadata, and user manuals bundled into the installer, [...] the software is intended for internal use within the Russian Ministry of Foreign Affairs (MID), specifically for the relaying of annual report files from overseas consular posts (КЗУ — консульские загранучреждения) to the Consular Department of the MID via a secure channel." The trojanized installer is an MSI file that, when launched, initiates the infection sequence to establish contact with a command-and-control (C2) server to await further instructions. The remote access trojan, which comes with capabilities for file transfers and command execution, is believed to have been put to use as early as 2014 and has also been utilized by another North Korean threat actor known as Kimsuky and ScarCruft (aka APT37). It's currently not clear how the threat actors managed to obtain the installer, given that it's not publicly obtainable. But it's suspected that the long history of espionage operations targeting Russia may have helped them identify prospective tools for subsequent attacks. While North Korea's targeting of Russia is not new, the development comes amid growing geopolitical proximity between Russia and North Korea. State media from the Hermit Kingdom reported this week that Russian President Vladimir Putin has given leader Kim Jong Un a luxury Russian-made car. "To some extent, this should not come as a surprise; increasing strategic proximity would not be expected to fully overwrite extant DPRK collection needs, with an ongoing need on the part of the DPRK to be able to assess and verify Russian foreign policy planning and objectives," DCSO said. ⚡ Free Risk Assessment from Vanta Generate a gap assessment of your security and compliance posture, discover shadow IT, and more.
Daily Brief Summary
Russian Consular Department software installer compromised to distribute Konni RAT malware by suspected North Korean actors.
German cybersecurity firm DCSO linked the cyberespionage operation to North Korea's historic patterns of targeting Russian entities.
The backdoored software, named 'Statistika KZU', was intended for internal use by the Russian Ministry of Foreign Affairs.
The MSI file initiates contact with a C2 server, allowing file transfers and command execution by the remote access trojan.
Previous instances of similar backdooring occurred in October 2023, involving Russian tax filing software.
Unclear how the installer was obtained by threat actors, hinting at extensive espionage efforts by North Korea against Russia.
Despite geopolitical ties strengthening between North Korea and Russia, espionage activities continue to assess and verify Russian foreign policy.
The report emphasizes the persistent threat landscape amidst evolving international relations.