Security News > 2022 > August > Russian State Hackers Continue to Attack Ukrainian Entities with Infostealer Malware
Russian state-sponsored actors are continuing to strike Ukrainian entities with information-stealing malware as part of what's suspected to be an espionage operation.
Symantec, a division of Broadcom Software, attributed the malicious campaign to a threat actor tracked Shuckworm, also known as Actinium, Armageddon, Gamaredon, Primitive Bear, and Trident Ursa.
The threat actor, active since at least 2013, is known for explicitly singling out public and private entities in Ukraine.
The latest set of attacks are said to have commenced on July 15, 2022, and ongoing as recently as August 8, with the infection chains leveraging phishing emails disguised as newsletters and combat orders, ultimately leading to the deployment of a PowerShell stealer malware dubbed GammaLoad.PS1 v2.
The findings come as the Gamaredon actor has been linked to a series of social engineering attacks aimed at initiating the GammaLoad.PS1 delivery chain, enabling the threat actor to steal files and credentials stored in web browsers.
"As the Russian invasion of Ukraine approaches the six-month mark, Shuckworm's long-time focus on the country appears to be continuing unabated," Symantec noted.
News URL
https://thehackernews.com/2022/08/russian-state-hackers-continue-to.html
Related news
- Russian hackers use RDP proxies to steal data in MiTM attacks (source)
- Russian ISP confirms Ukrainian hackers "destroyed" its network (source)
- Russian Turla hackers hit Starlink-connected devices in Ukraine (source)
- Russian cyber spies hide behind other hackers to target Ukraine (source)
- New IOCONTROL malware used in critical infrastructure attacks (source)
- 390,000 WordPress accounts stolen from hackers in supply chain attack (source)
- Ukrainian Minors Recruited for Cyber Ops and Reconnaissance in Russian Airstrikes (source)
- FBI spots HiatusRAT malware attacks targeting web cameras, DVRs (source)
- Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection (source)
- Hackers Use Microsoft MSC Files to Deploy Obfuscated Backdoor in Pakistan Attacks (source)