Article Details

Scrape Timestamp (UTC): 2023-10-18 09:13:33.504

Source: https://thehackernews.com/2023/10/tetrisphantom-cyber-espionage-via.html

Original Article Text

Click to Toggle View

TetrisPhantom: Cyber Espionage via Secure USBs Targets APAC Governments. Government entities in the Asia-Pacific (APAC) region are the target of a long-running cyber espionage campaign dubbed TetrisPhantom. "The attacker covertly spied on and harvested sensitive data from APAC government entities by exploiting a particular type of secure USB drive, protected by hardware encryption to ensure the secure storage and transfer of data between computer systems," Kaspersky said in its APT trends report for Q3 2023. The Russian cybersecurity firm, which detected the ongoing activity in early 2023, said the USB drives offer hardware encryption and are employed by government organizations worldwide to securely store and transfer data, raising the possibility that the attacks could expand in the future to have a global footprint. The clandestine intrusion set has not been linked to any known threat actor or group, but the high-level of sophistication of the campaign points to a nation-state crew. "These operations were conducted by a highly skilled and resourceful threat actor, with a keen interest in espionage activities within sensitive and safeguarded government networks," Noushin Shabab, senior security researcher at Kaspersky, said. "The attacks were extremely targeted and had a quite limited number of victims." A key hallmark of the campaign is the use of various malicious modules to execute commands and collect files and information from compromised machines and propagate the infection to other machines using the same or other secure USB drives as a vector. The malware components, besides self-replicating through connected secure USB drives to breach air-gapped networks, are also capable of executing other malicious files on the infected systems. "The attack comprises sophisticated tools and techniques," Kaspersky said, adding the attack sequences also entailed the "injection of code into a legitimate access management program on the USB drive which acts as a loader for the malware on a new machine." The disclosure comes as a new and unknown advanced persistent threat (APT) actor has been linked to a set of attacks targeting government entities, military contractors, universities, and hospitals in Russia via spear-phishing emails containing booby-trapped Microsoft Office documents. "This initiates a multi-level infection scheme leading to the installation of a new Trojan, which is primarily designed to exfiltrate files from the victim's machine and gain control by executing arbitrary commands," Kaspersky said. The attacks, codenamed BadRory by the company, played out in the form of two waves – one in October 2022, followed by a second in April 2023.

Daily Brief Summary

NATION STATE ACTIVITY // Cyber Espionage Campaign Targets APAC Governments via Secure USBs

TetrisPhantom is a long-running cyber espionage campaign targeting government bodies in the Asia-Pacific (APAC) region by exploiting a type of secure USB drive used for secure data storage and transfer, according to Kaspersky's Q3 2023 APT trends report.

The Russian cybersecurity firm identified the ongoing activity early in the year and raised concerns that the campaign could expand globally due to the worldwide use of the secure USB drives under attack.

The responsible actors behind the campaign remain unknown but the sophistication of the campaign implicates a nation-state group. The attacks are highly targeted and limited in victim numbers.

A notable feature of the campaign is the use of several malware modules to launch commands, gather data, and spread the infection through connected secure USB drive networks.

Kaspersky warns that the TartisPhantom campaign includes complex tools and approaches, such as injecting code into a legitimate access management program on the USB drive, which acts as a loader for the malware on new machines.

The report also disclosed about a new, unknown Advanced Persistent Threat (APT) actor responsible for several attack sets on government entities, military contractors, universities, and hospitals in Russia via spear-phishing emails carrying malware-laden Microsoft Office documents. These attacks have been codenamed as BadRory by Kaspersky.