Trending

HomeBlog
Gamaredon APT Targeting Ukraine with New Variants

Gamaredon APT Targeting Ukraine with New Variants

Gamaredon, the Russia-backed advanced persistent threat (APT) threat actor that has been active since at least 2013 has reinforced its surreptitious cyber warfare activities for gathering intelligence on the Ukrainian national security and military forces through enhanced tools, techniques, and tactics. Functioning as a proxy for the Russian intelligence, Gamaredon is known to conduct espionage attacks on Ukrainian military forces, thereby giving pro-Russian forces a competitive edge on account of the intelligence amassed by the group.

Recently, Cyble Research Team observed a new surge of Gamaredon APT attacks targeting the Ukrainian national security force with spear-phishing emails. The attached exploit document delivers additional payload and sadly, the spear-phishing email is marked as ‘clean’ by Kaspersky Secure Mail Gateway. As shown in the figure below, the email header information further affirms that the threat actor is originating from Russia.

Figure 1: Target email of Gamaredon Campaign

As shown in Figure 2, the VT intelligence hook graph clearly depicts the link of the smtp server that targets towards the Ukrainian server named “ssu.gov.ua”.

Figure 2: Hook diagram of Threat Actor

At the time of analysis, the malicious document file only had a few endpoint detections, as depicted in figure 3.

report-ad-banner

Figure 3: VT coverage of malicious document

The exploit document employs the template injection technique to install additional malware on the victim’s machine. Upon opening the document, it connects back to the hacker’s server “srv166997[.]hoster-test[.]ru” to download the payload file named “HIXOzc.dot“, as demonstrated in the image below.

Figure 4: Template injection connects back to C2 server

The APT group has remained active since 2013, with several Gamaredon-related activities reported on the first quarter of 2020. The latest attack by the threat group has a similar infection flow as identified in the APT group’s earlier Covid-19 campaign with minor changes in the email header and subject. Here is the high-level infection flow of the threat actor:

  • It starts with a spear-phishing email with a malicious document that targets victims.
  • The exploit document delivers additional payload through the template injection technique.
  • The installed payload performs malicious actives as per the hacker’s command.

Conclusion:

The Gamaredon group is characterized by the continuous enhancement of its technical capabilities, persistent targeting of the Ukrainian national security entities, and it sets an illustrative example of cyber warfare between two nations.

Cyble Research team is continuously monitoring to harvest threat indicators/TTP’s of Emerging APT’s in the wild to ensure that targeted organizations are well informed and proactively protected.

Indicators of Compromise (IoCs)

1bfaec25ad02e0c25323ef0427fef804 – №23 01-12 38 від 05.10.2020.eml

8e575b76cbd9d7b7b41080991aafd663 – Malicious document

00193e6e5daddd26d2417ad49038b2ae – Hack-Loader2.exe

Srv166997[.]hoster-test[]ru/decidedly/seen/days/grown/HBHoFp[.]dot – template injection network destination

Sakidus[.]myftp[.]org/KyVJhg[.]dot – Template injection network destination

Moris[.]hopto[.]org/post/win/SBuTcj[.]dot – Template injection network destination

srv159232[.]hoster-test[.]ru/json[.]php – C2 communication

31.28.24[.]131 – C2

MITRE ATT&CK Framework

About Cyble

Cyble is a global threat intelligence SaaS provider that helps enterprises protect themselves from cybercrimes and exposure in the darkweb. Cyble’s prime focus is to provide organizations with real-time visibility into their digital risk footprint. Backed by Y Combinator as part of the 2021 winter cohort, Cyble has also been recognized by Forbes as one of the top 20 Best Cybersecurity Startups To Watch In 2020. Headquartered in Alpharetta, Georgia, and with offices in Australia, Singapore, and India, Cyble has a global presence. To learn more about Cyble, visit www.cyble.io.     

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.

Get Threat Assessment Report

Identify External Threats Targeting Your Business​
Free

Threat Landscape Reports 2025

Upcoming Webinars

CISO's Guide to Threat Intelligence 2024

CISO’s Guide to Threat Intelligence 2024: Best Practices

Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now

Share the Post:
Scroll to Top

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading