Article Details
Scrape Timestamp (UTC): 2024-03-22 19:32:05.517
Original Article Text
Click to Toggle View
Russian hackers target German political parties with WineLoader malware. Researchers are warning that a notorious hacking group linked to Russia's Foreign Intelligence Service (SVR) is targeting political parties in Germany for the first time, shifting their focus away from the typical targeting of diplomatic missions. The phishing attacks are designed to deploy a backdoor malware named WineLoader, which allows threat actors to gain remote access to compromised devices and networks. APT29 (also known as Midnight Blizzard, NOBELIUM, Cozy Bear) is a Russian espionage hacking group believed to be part of the Russian Foreign Intelligence Service (SVR) The hacking group has been linked to many cyberattacks, including the infamous SolarWinds supply chain attack in December 2020. The threat actors have remained active throughout these years, typically targeting governments, embassies, senior officials, and various entities using a range of phishing tactics or supply chain compromises. APT29's recent focus has been on cloud services, breaching Microsoft systems and stealing data from Exchange accounts, and compromising the MS Office 365 email environment used by Hewlett Packard Enterprise. Impersonating political parties Mandiant researchers say that APT29 has been conducting a phishing campaign against German political parties since late February 2024. This marks a significant shift in the hacking group's operational focus, as it's the first time the hacking group has targeted political parties. The hackers now use phishing emails with a lure themed around the Christian Democratic Union (CDU), a major political party in Germany and currently the second largest in the federal parliament (Bundestag). The phishing emails seen by Mandiant pretend to be dinner invitations by the CDU that embed a link to an external page that drops a ZIP archive containing the 'Rootsaw' malware dropper. When executed, the Rootsaw malware downloads and executes a backdoor named 'WineLoader' on the victim's computer. The WineLoader malware was previously discovered by Zscaler in February, who saw it deployed in phishing attacks pretending to be invites to diplomats for a wine-tasting event. The WineLoader backdoor features several similarities with other malware variants deployed in past APT29 attacks, such as 'burnbatter', 'myskybeat', and 'beatdrop,' suggesting a common developer. However, the malware is modular and more customized than previous variants, does not use off-the-shelf loaders, and establishes an encrypted communication channel for data exchange with the command and control (C2) server. Mandiant's analysts first saw WineLoader in late January 2024 in an operation targeting the Czech Republic, Germany, India, Italy, Latvia, and Peru diplomats. Thus, the particular variant appears to have been the malware of choice for APT29 lately. To evade detection, WineLoader is decrypted using RC4 and loaded directly into memory via DLL side-loading, abusing a legitimate Windows executable (sqldumper.exe). Wineloader sends the victim's username, device name, process name, and other information to the C2 to help profile the system. The C2 can order the execution of modules that can be dynamically loaded to perform specific tasks, such as establishing persistence. Though Mandiant does not delve into any modules, it is assumed that WineLoader's modular nature allows it to execute a wide range of espionage activities in line with APT29's mission. APT29 continues demonstrating its advanced technical proficiency and ongoing efforts to develop tools to infiltrate and spy on targeted entities. The shift to political parties suggests an intent to influence or monitor political processes, possibly reflecting broader geopolitical objectives.
Daily Brief Summary
A Russian hacking group associated with the SVR is now attacking German political parties using WineLoader malware.
The shift in focus from diplomatic entities to political parties signifies an operational change for the group known as APT29, NOBELIUM, or Cozy Bear.
WineLoader enables remote access and espionage activities, and is the latest in a series of sophisticated tools used by APT29.
The campaign, noticed since late February 2024, involves phishing emails impersonating the Christian Democratic Union to distribute malware.
Previously targeting cloud services and email environments, APT29 demonstrates persistent and evolving cyber threats.
Mandiant researchers identified the recent use of WineLoader in various countries, indicating a broad and continued espionage effort.
WineLoader's complexity and evasion techniques reflect APT29's technical sophistication and adaptability.