Russia-Ukraine: APT campaign in conflict area

Kaspersky_news

Share post

A previously unknown malware in an APT campaign steals data from administrative, agricultural and transport companies in Donetsk, Luhansk and Crimea regions. The new backdoor PowerMagic and the modular framework CommonMagic are used.

In October 2022, Kaspersky researchers discovered an ongoing Advanced Persistent Threat (APT) campaign targeting organizations in the Russian-Ukrainian war zone. Dubbed 'CommonMagic' by Kaspersky, the espionage campaign has been active since at least September 2021 and uses a previously unknown malware to gather data from its targets. The targets include administrative, agricultural and transport companies in the Donetsk, Luhansk and Crimea regions.

Backdoor PowerMagic attacks

The APT attacks are executed using a PowerShell-based backdoor called 'PowerMagic' and the new malicious framework 'CommonMagic'. The latter makes it possible to steal files from USB devices, collect data and forward them to the attacker. Additionally, the modular structure of the framework allows adding malicious activities via new malicious modules.

The attack was probably initially carried out using spear phishing or similar methods. Targeted individuals were directed to a URL, which in turn led to a ZIP archive hosted on a malicious server. This archive contained both a malicious file that provided the PowerMagic backdoor and a harmless deceptive document designed to trick those affected into believing the content was legitimate. Kaspersky experts discovered a number of such decoy archives with titles referring to various decrees of organizations relevant in the region.

Spear phishing initiated actions

Once a user downloads the archive and clicks the link file in the archive, it is infected with the PowerMagic backdoor. The backdoor receives commands from a remote folder on a public cloud storage service, executes the commands sent from the server, and then uploads the execution results back to the cloud. In addition, PowerMagic embeds itself in the system in such a way that it is launched every time the infected device starts up.

At this time, no direct correlation can be established between the code used in this campaign and data from previously known cases. However, the campaign is still active and analysis is ongoing. Given the limited victimology and thematic lures, it is plausible that the attackers have a particular interest in the geopolitical situation in the conflict region.

More at Kaspersky.com

 


About Kaspersky

Kaspersky is an international cybersecurity company founded in 1997. Kaspersky's in-depth threat intelligence and security expertise serve as the basis for innovative security solutions and services to protect companies, critical infrastructures, governments and private users worldwide. The company's comprehensive security portfolio includes leading endpoint protection as well as a range of specialized security solutions and services to defend against complex and evolving cyber threats. Kaspersky technologies protect over 400 million users and 250.000 corporate customers. More information about Kaspersky can be found at www.kaspersky.com/


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more