Security News > 2022 > August > Russian State Hackers Continue to Attack Ukrainian Entities with Infostealer Malware

Russian State Hackers Continue to Attack Ukrainian Entities with Infostealer Malware
2022-08-16 06:36

Russian state-sponsored actors are continuing to strike Ukrainian entities with information-stealing malware as part of what's suspected to be an espionage operation.

Symantec, a division of Broadcom Software, attributed the malicious campaign to a threat actor tracked Shuckworm, also known as Actinium, Armageddon, Gamaredon, Primitive Bear, and Trident Ursa.

The threat actor, active since at least 2013, is known for explicitly singling out public and private entities in Ukraine.

The latest set of attacks are said to have commenced on July 15, 2022, and ongoing as recently as August 8, with the infection chains leveraging phishing emails disguised as newsletters and combat orders, ultimately leading to the deployment of a PowerShell stealer malware dubbed GammaLoad.PS1 v2.

The findings come as the Gamaredon actor has been linked to a series of social engineering attacks aimed at initiating the GammaLoad.PS1 delivery chain, enabling the threat actor to steal files and credentials stored in web browsers.

"As the Russian invasion of Ukraine approaches the six-month mark, Shuckworm's long-time focus on the country appears to be continuing unabated," Symantec noted.


News URL

https://thehackernews.com/2022/08/russian-state-hackers-continue-to.html