Article Details

Scrape Timestamp (UTC): 2025-04-16 12:32:15.468

Source: https://www.theregister.com/2025/04/16/cozy_bear_grapeloader/

Original Article Text

Click to Toggle View

Russians lure European diplomats into malware trap with wine-tasting invite. Vintage phishing varietal has improved with age. Russia never stops using proven tactics, and its Cozy Bear, aka APT 29, cyber-spies are once again trying to lure European diplomats into downloading malware with a phony invitation to a lux event. Last year, the Kremlin team went after German politicians with Windows backdoor malware dubbed Wineloader concealed in fake invitations to a dinner reception. Now, malware hunters at Check Point say the same crew is back with Grapeloader, and instead of supper, the Russians are luring Euro diplomats with an invitation to wine tasting. Offers to attend the swish gathering arrive in an email disguised to resemble a missive from an unnamed European country's Ministry of Foreign Affairs and were sent to diplomats across the continent. If the targets failed to respond, the scammers sent follow up emails. Subject lines included "Wine tasting event (update date)," "For Ambassador’s Calendar," and "Diplomatic dinner." The message itself has a link to a download from a remote server that really shouldn't be clicked on. "The server hosting the link is believed to be highly protected against scanning and automated analysis solutions, with the malicious download triggered only under certain conditions, such as specific times or geographic locations," the team at Check Point reported Tuesday. If a user meets the attackers’ criteria, clicking the invitation link downloads an archive called wine.zip. On other occasions the link directs the recipient to a legitimate page on the website of the embassy that supposedly sent the message. The wine.zip archive carries three files: Grapeloader copies the contents of the archive onto a victim PC's hard drive and changes the Windows Registry’s Run key to ensure persistence. It scans for information, including usernames, the computer name, process names, and process identifiers, and pings a Cozy Bear command-and-control server every 60 seconds for instructions to carry out and seemingly to take delivery of an updated version of Wineloader to run. The new vintage of Wineloader is a 64-bit trojanized DLL file that allows data to be harvested from the infected machine, encrypted using RC4, and sent back to the command-and-control server. It's much better at deleting signs of presence in memory and using junk code to hide its true nature from malware-hunting applications. Check Point’s analysis of the new Wineloader code and its targets led the outfit to conclude that Russia’s government and Cozy Bear, one of Moscow’s most potent and prolific cyber-snoop crews, is almost certainly behind the backdoor malware. The group was behind the massive 2020 SolarWinds hack and is thought to be one of the squads run by the FSB, Russia's primary intelligence agency. Cozy Bear has a long history that started in the late Naughts when it developed malware to assist spying efforts. The crew later moved onto organized campaigns against specific targets, such as the Democratic National Committee, the US State Department, and the White House before the USA’s 2016 national election. The gang was exposed when Dutch government whiz-kids managed to break into the crew's security cameras and observe them at work. Nowadays, Cozy collects whatever the Kremlin wants from Western governments and their allies - even going after COVID-19 vaccine development data during the pandemic. Presumably, the crew decided that luring diplomats with a party worked so well last time, it was time to tweak things and try again.

Daily Brief Summary

MALWARE // Russian Cyber Spies Deploy Malware via Fake Diplomatic Invites

Russian cyber group Cozy Bear, also known as APT 29, targeted European diplomats with malware-infected invitations to a fake wine-tasting event.

The phishing emails appeared to be from a legitimate European Ministry of Foreign Affairs, enticing diplomats with the exclusive event to ensure high engagement.

Unresponsive targets received follow-up emails to increase the chance of malware deployment through repeated engagement.

The emails contained a malicious link that, when clicked under specific conditions, initiated the download of a malware-infected file named wine.zip.

The malware, named Grapeloader, infiltrates the system, altering the Windows Registry for persistence, scanning for sensitive information, and establishing regular communication with a command-and-control server.

The cyber espionage efforts are presumably directed by the Russian government, leveraging Cozy Bear’s capacities to gather intelligence from Western political entities.

Historical context indicates that Cozy Bear has been involved in significant cyber espionage activities against the US and its allies, including incidents like the SolarWinds hack and operations against the 2016 US national election.