Article Details

Scrape Timestamp (UTC): 2024-04-23 04:29:24.140

Source: https://thehackernews.com/2024/04/russias-apt28-exploited-windows-print.html

Original Article Text

Click to Toggle View

Russia's APT28 Exploited Windows Print Spooler Flaw to Deploy 'GooseEgg' Malware. The Russia-linked nation-state threat actor tracked as APT28 weaponized a security flaw in the Microsoft Windows Print Spooler component to deliver a previously unknown custom malware called GooseEgg. The post-compromise tool, which is said to have been used since at least June 2020 and possibly as early as April 2019, leveraged a now-patched flaw that allowed for privilege escalation (CVE-2022-38028, CVSS score: 7.8). It was addressed by Microsoft as part of updates released in October 2022, with the U.S. National Security Agency (NSA) credited for reporting the flaw at the time. According to new findings from the tech giant's threat intelligence team, APT28 – also called Fancy Bear and Forest Blizzard (formerly Strontium) – weaponized the bug in attacks targeting Ukrainian, Western European, and North American government, non-governmental, education, and transportation sector organizations. "Forest Blizzard has used the tool [...] to exploit the CVE-2022-38028 vulnerability in Windows Print Spooler service by modifying a JavaScript constraints file and executing it with SYSTEM-level permissions," the company said. "While a simple launcher application, GooseEgg is capable of spawning other applications specified at the command line with elevated permissions, allowing threat actors to support any follow-on objectives such as remote code execution, installing a backdoor, and moving laterally through compromised networks." Forest Blizzard is assessed to be affiliated with Unit 26165 of the Russian Federation's military intelligence agency, the Main Intelligence Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU). Active for nearly 15 years, the Kremlin-backed hacking group's activities are predominantly geared towards intelligence collection in support of Russian government foreign policy initiatives. In recent months, APT28 hackers have also abused a privilege escalation flaw in Microsoft Outlook (CVE-2023-23397, CVSS score: 9.8) and a code execution bug in WinRAR (CVE-2023-38831, CVSS score: 7.8), indicating their ability to swiftly adopt public exploits into their tradecraft. "Forest Blizzard's objective in deploying GooseEgg is to gain elevated access to target systems and steal credentials and information," Microsoft said. "GooseEgg is typically deployed with a batch script." The GooseEgg binary supports commands to trigger the exploit and launch either a provided dynamic-link library (DLL) or an executable with elevated permissions. It also verifies if the exploit has been successfully activated using the whoami command. The disclosure comes as IBM X-Force revealed new phishing attacks orchestrated by the Gamaredon actor (aka Aqua Blizzard, Hive0051, and UAC-0010) that deliver new iterations of the GammaLoad malware - "Hive0051 rotates infrastructure through synchronized DNS fluxing across multiple channels including Telegram, Telegraph and Filetransfer.io," IBM X-Force researchers said earlier this month, stating it "points to a potential elevation in actor resources and capability devoted to ongoing operations." "It is highly likely Hive0051's consistent fielding of new tools, capabilities and methods for delivery facilitate an accelerated operations tempo." Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. How to Update and Automate Outdated Security Processes Download the eBook for step-by-step guidance on how to update your security processes as your business grows.

Daily Brief Summary

NATION STATE ACTIVITY // Russia's APT28 Uses Windows Flaw to Spread GooseEgg Malware

APT28, a Russian nation-state threat actor, exploited a vulnerability in Microsoft Windows Print Spooler to deploy the GooseEgg malware.

The security flaw, known as CVE-2022-38028 with a CVSS score of 7.8, was patched by Microsoft in October 2022 following NSA's identification.

GooseEgg allows for privilege escalation and the execution of commands with SYSTEM-level permissions, targeting entities in Ukraine, Western Europe, and North America.

The malware primarily affected government, NGO, education, and transportation sectors, serving as a tool for intelligence collection aligned with Russian foreign policy.

GooseEgg is capable of launching applications that facilitate further exploits such as remote code execution, installing backdoors, and lateral movement within networks.

APT28, also known as Fancy Bear and Forest Blizzard, has been leveraging multiple other public exploits, demonstrating their rapid adaptation of new vulnerabilities.

This disclosure coincides with IBM X-Force's revelation of new phishing attacks by related Russian actor Gamaredon, indicating increased tempo and sophistication in Russian cyber operations.