Microsoft says Russia is hacking Ukrainian military tech by stealing points
of entry from third-parties
Date:
Wed, 11 Dec 2024 17:00:00 +0000
Description:
Microsoft Threat Intelligence has observed Secret Blizzard using attack
vectors gained by other threat actors to compromise Ukrainian military
devices.
FULL STORY
Microsoft Threat Intelligence has revealed notorious Russian threat actor
Secret Blizzard has been working with other cybercriminals to conduct
espionage on targeted organizations of interest in South Asia as well as
installing multiple backdoors on devices in Ukraine.
The team has highlighted Secret Blizzard is using cyber attacks conducted by
Russian threat actors as a vector of entry to install the Amadey bot malware
and backdoors onto Ukrainian devices for espionage purposes.
Secret Blizzard is assessed to either purchase or steal points of entry onto
Ukrainian devices from other Russia-aligned state sponsored threat actors in
order to diversify its ability to monitor devices and conduct attacks.
Espionage and monitoring
The initial point of access for Secret Blizzard is usually conducted via
spearphishing attacks before moving laterally through networks of interest
via server-side and edge device compromise.
One access to a device is gained, Secret Blizzard was observed deploying a
Powershell dropper via the Amadey malware-as-a-service (MaaS), which allows
Secret Blizzard to see device configurations and collect information through
a command and control (C2) server.
The Amadey would then gather and relay information on the type of antivirus
software installed on the device, before installing two plugins on the target
device that Microsoft Threat Intelligence theorizes are used to gather
clipboard data and browser credentials.
Secret Blizzard would also seek out and target devices that use a Starlink IP
address as a favoured target, before deploying a custom algorithm that allows
the threat actor to steal data from the targeted device including the
directory tree, system information, active sessions, IPv4 route table, SMB
shares, enabled security groups, and time settings.
Microsoft Threat Intelligence also observed a cmd prompt being used to gather
information from Windows Defender as to whether previous versions of the
Amadey malware had been spotted on the system in order to gauge if the target
device was of interest.
Secret Blizzard is actively adapting its attack techniques to specifically
target Ukrainian military devices, with Microsoft assessing that footholds
are likely being exploited to escalate toward strategic access at the
Ministry level.
======================================================================
Link to news story:
https://www.techradar.com/pro/security/microsoft-says-russia-is-hacking-ukrain
ian-military-tech-by-stealing-points-of-entry-from-third-parties
$$
--- SBBSecho 3.20-Linux
* Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)
|