ARSTECHNICA.COM
Russia takes unusual route to hack Starlink-connected devices in Ukraine
NATION STATE FREELOADING Russia takes unusual route to hack Starlink-connected devices in Ukraine Secret Blizzard has used the resources of at least 6 other groups in the past 7 years. Dan Goodin Dec 11, 2024 6:18 pm | 9 Story textSizeSmallStandardLargeWidth *StandardWideLinksStandardOrange* Subscribers only Learn moreRussian nation-state hackers have followed an unusual path to gather intel in the country's ongoing invasion of Ukraineappropriating the infrastructure of fellow threat actors and using it to infect electronic devices its adversarys military personnel are using on the front line.On at least two occasions this year, the Russian hacking group tracked under names including Turla, Waterbug, Snake, and Venomous Bear has used servers and malware used by separate threat groups in attacks targeting front-line Ukrainian military forces, Microsoft said Wednesday. In one case, Secret Blizzardthe name Microsoft uses to track the groupleveraged the infrastructure of a cybercrime group tracked as Storm-1919. In the other, Secret Blizzard appropriated resources of Storm-1837, a Russia-based threat actor with a history of targeting Ukrainian drone operators.The more common means for initial access by Secret Blizzard is spear phishing followed by lateral movement through server-side and edge device compromises. Microsoft said that the threat actors pivot here is unusual but not unique. Company investigators still dont know how Secret Blizzard obtained access to the infrastructure.Priority one: Ukraine military personnelRegardless of the means, Microsoft Threat Intelligence assesses that Secret Blizzards pursuit of footholds provided by or stolen from other threat actors highlights this threat actors prioritization of accessing military devices in Ukraine, Wednesdays post stated.From March to April of this year, Secret Blizzard used Amadey, a bot Storm-1919 typically uses to in attacks that deploy the XMRIG cryptocurrency app on targeted servers in cryptojacking campaigns. Such campaigns are carried out by crime groups that profit by mining digital coin using the resources of victims.Microsoft assesses that Secret Blizzard either used the Amadey malware as a service (MaaS) or accessed the Amadey command-and-control (C2) panels surreptitiously to download a PowerShell dropper on target devices, Microsoft said. The PowerShell dropper contained a Base64-encoded Amadey payload appended by code that invoked a request to Secret Blizzard C2 infrastructure.The ultimate objective was to install Tavdig, a backdoor Secret Blizzard used to conduct reconnaissance on targets of interest. The Amdey sample Microsoft uncovered collected information from device clipboards and harvested passwords from browsers. It would then go on to install a custom reconnaissance tool that was selectively deployed to devices of further interest by the threat actorfor example, devices egressing from STARLINK IP addresses, a common signature of Ukrainian front-line military devices.When Secret Blizzard assessed a target was of high value, it would then install Tavdig to collect information, including user info, netstat, and installed patches and to import registry settings into the compromised device.Earlier in the year, Microsoft said, company investigators observed Secret Blizzard using tools belonging to Storm-1887 to also target Ukrainian military personnel. Microsoft researchers wrote:In January 2024, Microsoft observed a military-related device in Ukraine compromised by a Storm-1837 backdoor configured to use the Telegram API to launch a cmdlet with credentials (supplied as parameters) for an account on the file-sharing platform Mega. The cmdlet appeared to have facilitated remote connections to the account at Mega and likely invoked the download of commands or files for launch on the target device. When the Storm-1837 PowerShell backdoor launched, Microsoft noted a PowerShell dropper deployed to the device. The dropper was very similar to the one observed during the use of Amadey bots and contained two base64 encoded files containing the previously referenced Tavdig backdoor payload (rastls.dll) and the Symantec binary (kavp.exe).As with the Amadey bot attack chain, Secret Blizzard used the Tavdig backdoor loaded into kavp.exe to conduct initial reconnaissance on the device. Secret Blizzard then used Tavdig to import a registry file, which was used to install and provide persistence for the KazuarV2 backdoor, which was subsequently observed launching on the affected device.Although Microsoft did not directly observe the Storm-1837 PowerShell backdoor downloading the Tavdig loader, based on the temporal proximity between the execution of the Storm-1837 backdoor and the observation of the PowerShell dropper, Microsoft assesses that it is likely that the Storm-1837 backdoor was used by Secret Blizzard to deploy the Tavdig loader.Wednesdays post comes a week after both Microsoft and Lumen's Black Lotus Labs reported that Secret Blizzard co-opted the tools of a Pakistan-based threat group tracked as Storm-0156 to install backdoors and collect intel on targets in South Asia. Microsoft first observed the activity in late 2022. In all, Microsoft said, Secret Blizzard has used the tools and infrastructure of at least six other threat groups in the past seven years.When parts one and two of this blog series are taken together, it indicates that Secret Blizzard has been using footholds from third partieseither by surreptitiously stealing or purchasing accessas a specific and deliberate method to establish footholds of espionage value, Wednesdays report concluded. Nevertheless, Microsoft assesses that while this approach has some benefits that could lead more threat adversaries to use it, it is of less use against hardened networks, where good endpoint and network defenses enable the detection of activities of multiple threat adversaries for remediation.Dan GoodinSenior Security EditorDan GoodinSenior Security Editor Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. In his spare time, he enjoys gardening, cooking, and following the independent music scene. Dan is based in San Francisco. Follow him at here on Mastodon and here on Bluesky. Contact him on Signal at DanArs.82. 9 Comments
0 Комментарии 0 Поделились 33 Просмотры