Security News > 2022 > September > Russian hackers use new info stealer malware against Ukrainian orgs
Russian hackers have been targeting Ukrainian entities with previously unseen info-stealing malware during a new espionage campaign that is still active.
Security researchers at Cisco Talos attribute the campaign to Gamaredon, a Russian state-backed threat group with a long history of targeting mainly organizations in the Ukrainian government, critical infrastructure, defense, security, and law enforcement.
Cisco Talos attributed a newly observed espionage campaign to Gamaredon and noticed the use of a new info stealer that can extract from victim computers specific file types as well as deploy additional malware.
Cisco Talos says that Gamaredon's new infostealer can exfiltrate files from attached storage devices, making for each stolen file a POST request with metadata and its content.
During the recursive enumeration of all files in directories, the malware avoids system folders to focus only on files of interest to the threat actor.
Cisco Talos has provided a list of indicators of compromise for malicious documents, LNK files, RAR archives, the new infostealer, URLs, and payload drop sites.
News URL
Related news
- Russian Hackers Use 'WINELOADER' Malware to Target German Political Parties (source)
- Russian hackers use new Lunar malware to breach a European govt's agencies (source)
- Hackers Hit Indian Defense, Energy Sectors with Malware Posing as Air Force Invite (source)
- Hackers Target macOS Users with Malicious Ads Spreading Stealer Malware (source)
- China-linked Hackers Deploy New 'UNAPIMON' Malware for Stealthy Operations (source)
- Vietnam-Based Hackers Steal Financial Data Across Asia with Malware (source)
- TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks (source)
- Russian Sandworm hackers pose as hacktivists in water utility breaches (source)
- Russian Sandworm hackers targeted 20 critical orgs in Ukraine (source)
- Russian hackers’ custom tool exploits old Windows Print Spooler flaw (CVE-2022-38028) (source)