Article Details
Scrape Timestamp (UTC): 2023-12-12 14:55:22.471
Source: https://thehackernews.com/2023/12/russian-apt28-hackers-targeting-13.html
Original Article Text
Click to Toggle View
Russian APT28 Hackers Targeting 13 Nations in Ongoing Cyber Espionage Campaign. The Russian nation-state threat actor known as APT28 has been observed making use of lures related to the ongoing Israel-Hamas war to facilitate the delivery of a custom backdoor called HeadLace. IBM X-Force is tracking the adversary under the name ITG05, which is also known as BlueDelta, Fancy Bear, Forest Blizzard (formerly Strontium), FROZENLAKE, Iron Twilight, Sednit, Sofacy, and TA422. "The newly discovered campaign is directed against targets based in at least 13 nations worldwide and leverages authentic documents created by academic, finance and diplomatic centers," security researchers Golo Mühr, Claire Zaboeva, and Joe Fasulo said. "ITG05's infrastructure ensures only targets from a single specific country can receive the malware, indicating the highly targeted nature of the campaign." Ever wondered why social engineering is so effective? Dive deep into the psychology of cyber attackers in our upcoming webinar. Targets of the campaign include Hungary, Türkiye, Australia, Poland, Belgium, Ukraine, Germany, Azerbaijan, Saudi Arabia, Kazakhstan, Italy, Latvia, and Romania. The campaign involves the use of decoys that are designed to primarily single out European entities with a "direct influence on the allocation of humanitarian aid," leveraging documents associated with the United Nations, the Bank of Israel, the U.S. Congressional Research Service, the European Parliament, a Ukrainian think tank, and an Azerbaijan-Belarus Intergovernmental Commission. Some of the attacks have been found to employ RAR archives exploiting the WinRAR flaw called CVE-2023-38831 to propagate HeadLace, a backdoor that was first disclosed by the computer Emergency Response Team of Ukraine (CERT-UA) in attacks aimed at critical infrastructure in the country. It's worth noting that Zscaler revealed a similar campaign named Steal-It in late September 2023 that enticed targets with adult-themed content to trick them into parting with sensitive information. The disclosure comes a week after Microsoft, Palo Alto Networks Unit 42, and Proofpoint detailed the threat actor's exploitation of a critical security flaw of Microsoft Outlook (CVE-2023-23397, CVSS score: 9.8) to gain unauthorized access to victims' accounts within Exchange servers. The reliance on official documents as lures, therefore, marks a deviation from previously observed activity, "indicative of ITG05's increased emphasis on a unique target audience whose interests would prompt interaction with material impacting emerging policy creation." "It is highly likely the compromise of any echelon of global foreign policy centers may aid officials' interests with advanced insight into critical dynamics surrounding the International Community's (IC) approach to competing priorities for security and humanitarian assistance," the researchers said. The development comes as CERT-UA linked the threat actor known as UAC-0050 to a massive email-based phishing attack against Ukraine and Poland using Remcos RAT and Meduza Stealer.
Daily Brief Summary
Russian state-backed threat actor APT28 has been targeting entities across 13 nations in a focused cyber espionage campaign.
The actor employs a custom backdoor known as HeadLace, exploiting current geopolitical tensions as lures in their attacks.
The attacks leverage legitimate documents from academic, financial, and diplomatic organizations to ensure the malware reaches specific targets.
A recently identified exploit, CVE-2023-38831 in WinRAR, is being used to deliver the HeadLace backdoor.
Phishing campaigns employ decoy documents related to significant international bodies like the United Nations and the European Parliament.
Microsoft and other cybersecurity firms have documented APT28's use of severe Outlook vulnerabilities to infiltrate Exchange servers.
This recent shift to using policy-related documents indicates an increased focus on influencing and gaining insights into foreign policy and humanitarian aid decisions.
Concurrently, CERT-UA has reported a substantial phishing operation against Ukraine and Poland, attributed to a separate entity, which uses Remcos RAT and Meduza Stealer malware.