Microsoft discovers Storm-0978 spying phishing

Microsoft discovers Storm-0978 spying phishing

Share post

Microsoft has identified a phishing campaign by Russian threat actor Storm-0978 targeting defense and government agencies in Europe and North America. It's about financial data and espionage in the attack.

Storm-0978 (DEV-0978; also referred to by others as RomCom, the name of their backdoor) is a Russia-based cybercriminal group known for conducting opportunistic ransomware and extortion operations, as well as credential-targeting attacks. Storm-0978 operates, develops and distributes the RomCom backdoor. The actor also deploys the underground ransomware, which is closely related to the Industrial Spy ransomware, which was first observed in the wild in May 2022. The actor's last campaign, discovered in June 2023, involved the abuse of CVE-2023-36884 to provide a backdoor with similarities to RomCom.

Russian Storm-0978 takes targeted action

Storm-0978 is known to target organizations with trojanized versions of popular legitimate software, which leads to installation of RomCom. Storm-0978's targeted operations impacted government and military organizations primarily in Ukraine, as well as organizations in Europe and North America that may be involved in Ukrainian affairs. Identified ransomware attacks have affected the telecom and financial industries, among others.

Storm-0978 tools and TTPs

🔎 Storm-0978 emails used Ukrainian World Congress and NATO topics (Image: Microsoft).

Storm-0978 uses trojanized versions of popular, legitimate software. Observed examples of trojanized software are Adobe products, Advanced IP Scanner, Solarwinds Network Performance Monitor, Solarwinds Orion, KeePass, and Signal. In order to provide the trojanized installers for deployment, Storm-0978 typically registers malicious domains that mimic the legitimate software (e.g., the advanced-ip-scaner[.]com malicious domain).

In financially motivated ransomware attacks, Storm-0978 uses Industrial Spy ransomware, a ransomware variant first observed in the wild in May 2022, and Underground ransomware. The actor has also used the Trigona ransomware in at least one identified attack.

Additionally, due to the attributed phishing activities, Storm-0978 has acquired exploits targeting zero-day vulnerabilities. Identified exploit activities include abuse of CVE-2023-36884 , including a remote code execution vulnerability, which was exploited via Microsoft Word documents in June 2023, as well as abuse of vulnerabilities that help bypass a security feature.

ransomware activity

In known ransomware intrusions, Storm-0978 has accessed credentials by dumping password hashes from the Security Account Manager (SAM) through the Windows registry. To access SAM, attackers must acquire SYSTEM-level privileges. Microsoft Defender for Endpoint detects this type of activity with alerts such as "SAM registry hive export". Storm-0978 then leveraged the Impacket framework's SMBExec and WMIExec functionalities for lateral movement.

Microsoft has linked Storm-0978 to its past management of the Industrial Spy and Crypter ransomware market. However, as early as July 0978, Storm-2023 began using a ransomware variant called Underground, which has significant code overlap with the Industrial Spy ransomware. The code similarity between the two ransomware variants, as well as Storm-0978's previous involvement in Industrial Spy operations, could indicate that Underground is a renaming of Industrial Spy ransomware.

Phishing campaign in June 2023

Storm-0978 ran a phishing campaign using a fake OneDrive loader to inject a backdoor with RomCom-like similarities. The phishing emails were targeted at defense and government agencies in Europe and North America and contained bait related to the Ukrainian World Congress. These emails led to exploitation of the CVE-2023-36884 vulnerability.

Notably, during this campaign, Microsoft identified concurrent, separate Storm-0978 ransomware activities against an unrelated target that used the same initial payloads. Subsequent ransomware activity against a different victim profile underscores the diverse motivations observed in Storm-0978 attacks.

More at Microsoft.com

 


About Microsoft Germany

Microsoft Deutschland GmbH was founded in 1983 as the German subsidiary of Microsoft Corporation (Redmond, USA). Microsoft is committed to empowering every person and company in the world to achieve more. This challenge can only be mastered together, which is why diversity and inclusion have been firmly anchored in the corporate culture from the very beginning.

As the world's leading manufacturer of productive software solutions and modern services in the age of intelligent cloud and intelligent edge, as well as a developer of innovative hardware, Microsoft sees itself as a partner to its customers to help them benefit from the digital transformation. Security and data protection have top priority when developing solutions. As the world's largest contributor, Microsoft is driving open source technology through its leading developer platform GitHub. With LinkedIn, the largest career network, Microsoft promotes professional networking worldwide.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more