Security News > 2021 > June > Russian Hackers Use New 'SkinnyBoy' Malware in Attacks on Military, Government Orgs
The Russia-linked threat group known as APT28 has been observed using a new backdoor in a series of attacks targeting military and government institutions, researchers with threat intelligence company Cluster25 reveal.
For initial access, the threat actor is known to use tactics such as watering hole attacks, social engineering, zero-day vulnerabilities, and stolen credentials, followed by the deployment of tools and malware that allow it to achieve persistence and gain access to information of interest.
While the tactics observed in this campaign were no different from previous attacks, what stood out was the use of a new backdoor that Cluster25's researchers have dubbed SkinnyBoy.
The attacks would start with spear-phishing emails delivering a Word document carrying malicious macros that extract a DLL designed to fetch the SkinnyBoy dropper, which achieves persistence and downloads all the components for the next stage.
The SkinnyBoy implant was designed to exfiltrate information from the infected system, as well as to fetch and run directly in memory the final payload, "Which probably exhibits typical backdoor behaviors," Cluster25 notes.
"After a period of observation of the described threat and an in-depth analysis of the identified victimology, Cluster25 team attributes the SkinnyBoy implant and the related attack to Russian group known as APT28/FancyBear with a mid-to-high confidence," the researchers conclude.
News URL
Related news
- Russian hackers use RDP proxies to steal data in MiTM attacks (source)
- Russian Turla hackers hit Starlink-connected devices in Ukraine (source)
- Russian cyber spies hide behind other hackers to target Ukraine (source)
- New IOCONTROL malware used in critical infrastructure attacks (source)
- 390,000 WordPress accounts stolen from hackers in supply chain attack (source)
- FBI spots HiatusRAT malware attacks targeting web cameras, DVRs (source)
- Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection (source)
- Hackers Use Microsoft MSC Files to Deploy Obfuscated Backdoor in Pakistan Attacks (source)
- Rspack npm Packages Compromised with Crypto Mining Malware in Supply Chain Attack (source)
- North Korean Hackers Deploy OtterCookie Malware in Contagious Interview Campaign (source)