Article Details
Scrape Timestamp (UTC): 2024-04-22 12:35:01.426
Original Article Text
Click to Toggle View
Russian Sandworm hackers targeted 20 critical orgs in Ukraine. Russian hacker group Sandworm aimed to disrupt operations at around 20 critical infrastructure facilities in Ukraine, according to a report from the Ukrainian Computer Emergency Response Team (CERT-UA). Also known as BlackEnergy, Seashell Blizzard, Voodoo Bear, and APT44, the hackers are believed to be associated with Russia's Main Directorate of the General Staff of the Armed Forces (the GRU), carrying out cyberespionage and destructive attacks on various targets. CERT-UA reports that in March 2024, APT44 conducted operations to disrupt information and communication systems at energy, water, and heating supliers in 10 regions of Ukraine. The attacks occurred in March and in some cases the hackers were able to infiltrate the targeted network by poisoning the supply chain to deliver compromised or vulnerable software, or through the software provider's ability to access organization's systems for maintainance and technical suport. Sandworm also combined previously documented malware with new malicious tools (BIASBOAT and LOADGRIP for Linux) to obtain access and move laterally on the network. The Ukrainian agency notes that Sandworm's breaches were made easier by the targets' poor cybersecurity practices (e.g. lack of network segmentation and insufficient defenses at the software supplier level). From March 7 to March 15, 2024, CERT-UA engaged in extensive counter-cyberattack operations, which included informing affected enterprises, removing malware, and enhancing security measures. Based on the findings from investigating the logs retrieved from the compromised entities, Sandworm relied on the following malware for its attacks on Ukraine's utility suppliers: Additional malicious tools CERT-UA discovered during the investigation are from the open source space and include the Weevly webshell, the Regeorg.Neo, Pitvotnacci, and Chisel tunnelers, LibProcessHider, JuicyPotatoNG, and RottenPotatoNG. The threat actors used these tools to maintain persistence, hide malicious processes, and elevate their privileges on compromised systems. The Ukrainian agency belives that the purpose of these attacks was to increase the effect of Russian missile strikes on the targeted infrastructure facilities. Last week, Mandiant exposed Sandworm's connection to three hacktivist-branded Telegram groups that have previously claimed attacks on critical infrastructure in Europe and the U.S. CERT-UA's report provides a long list of indicators of compromise that includes files, hosts, and network details.
Daily Brief Summary
Russian hacker group Sandworm, also known as BlackEnergy and APT44, targeted approximately 20 critical infrastructure facilities across Ukraine.
The cyberattacks aimed to disrupt operations within the energy, water, and heating sectors in 10 different regions.
The hackers infiltrated networks by compromising software supply chains and exploiting maintenance access.
New malware tools, BIASBOAT and LOADGRIP, were utilized to access and navigate through the targeted networks.
Poor cybersecurity practices at the targeted facilities, such as lack of network segmentation, facilitated the breaches.
From March 7 to March 15, 2024, Ukrainian CERT-UA conducted counter-cyberattack operations to mitigate the damage.
The attackers used additional open-source malicious tools for persistence and privilege elevation.
CERT-UA links these attacks to broader strategic objectives, correlating them with physical missile strikes to amplify their impact.