Article Details
Scrape Timestamp (UTC): 2024-04-22 17:22:48.378
Original Article Text
Click to Toggle View
Microsoft: APT28 hackers exploit Windows flaw reported by NSA. Microsoft warns that the Russian APT28 threat group exploits a Windows Print Spooler vulnerability to escalate privileges and steal credentials and data using a previously unknown hacking tool called GooseEgg. APT28 designed this tool to target the CVE-2022-38028 vulnerability reported by the U.S. National Security Agency, which Redmond fixed during the Microsoft October 2022 Patch Tuesday. The military hackers, part of Military Unit 26165 of Russia's Main Intelligence Directorate of the General Staff (GRU), use this tool to launch additional malicious tools and run various commands with SYSTEM-level privileges. Attackers deploy this tool as a Windows batch script named 'execute.bat' or 'doit.bat,' which launches a GooseEgg executable and gains persistence on the compromised system by adding a scheduled task that launches 'servtask.bat,' a second batch script written to the disk. They also use the exploit to drop an embedded malicious DLL file (in some cases dubbed 'wayzgoose23.dll') in the context of the PrintSpooler service with SYSTEM permissions. This DLL is actually an app launcher that can execute other payloads with SYSTEM-level permissions and lets attackers deploy backdoors, move laterally through victims' networks, and run remote code on breached systems. "Microsoft has observed Forest Blizzard using GooseEgg as part of post-compromise activities against targets including Ukrainian, Western European, and North American government, non-governmental, education, and transportation sector organizations," Microsoft explains. "While a simple launcher application, GooseEgg is capable of spawning other applications specified at the command line with elevated permissions, allowing threat actors to support any follow-on objectives such as remote code execution, installing a backdoor, and moving laterally through compromised networks." History of high-profile cyberattacks APT28 is a prominent Russian hacking group responsible for many high-profile cyber attacks since it first surfaced in the mid-2000s. Last year, U.S. and U.K. intelligence services warned about APT28 exploiting a Cisco router zero-day to deploy Jaguar Tooth malware, which allowed it to harvest sensitive information from targets in the U.S. and EU. More recently, in February, a joint advisory issued by the FBI, the NSA, and international partners warned that APT28 used hacked Ubiquiti EdgeRouters to evade detection in attacks. They were also linked in the past with the breach of the German Federal Parliament (Deutscher Bundestag) and hacks of the Democratic Congressional Campaign Committee (DCCC) and the Democratic National Committee (DNC) ahead of the 2016 U.S. Presidential Election. Two years later, the U.S. charged APT28 members for their involvement in the DNC and DCCC attacks, while the Council of the European Union also sanctioned APT28 members in October 2020 for the German Federal Parliament hack.
Daily Brief Summary
Russian APT28 hacking group exploits a Windows Print Spooler vulnerability, initially reported by the NSA, to escalate privileges and steal data.
The group employs a hacking tool known as GooseEgg, designed to exploit CVE-2022-38028, which Microsoft patched in October 2022.
GooseEgg allows attackers to run commands with SYSTEM-level privileges, deploy additional malicious tools, and maintain persistence on compromised systems.
The exploit also enables the deployment of a malicious DLL that can execute apps with elevated permissions, facilitating the launch of backdoors and lateral movement through networks.
Microsoft has observed attacks against Ukrainian, Western European, and North American targets in government, education, and transportation sectors.
Historically, APT28 has conducted high-profile cyberattacks, including exploiting Cisco router zero-days and hacking Ubiquiti EdgeRouters.
The U.S. and EU have imposed charges and sanctions on APT28 members linked to breaches at the German Federal Parliament and U.S. political organizations.