Russia-Ukraine War: Complex Cyberespionage 

Russia-Ukraine War: Complex Cyberespionage

Share post

The war in Ukraine is also a cyber war that promotes cyber espionage. Bitdefender Labs discover recent attacks on the Elephant framework. Attacks also take place through phishing with the download of supposed Bitdefender AV software. A summary of current cyber espionage.

Companies in the attacked country or in supporting nations connected to Ukraine are threatened by classic IT attack mechanisms, the perpetrators of which are politically motivated this time. In addition to deleting information, these include espionage. The Bitdefender Labs have analyzed the sophisticated attack mechanisms of the so-called Elephant Framework used for this.

Cyber ​​war worsens global cyber security situation

Threat intelligence experts and analysts from managed detection and response teams have been monitoring the cybersecurity landscape since the outbreak of war. As expected, companies and organizations in Ukraine, especially in the areas of public authorities and critical infrastructure, are among the preferred victims. The pro-Russian UAC-2021 group has been actively engaged in cyber espionage since March 0056. The group – also known by the names Lorec53, UNC2589, EmberBear, LorecBear, BleedingBear, SaintBear and TA471 – is responsible for data exfiltration attacks using stealer malware such as OutSteel or GraphSteel. GraphSteel in particular uses a sophisticated set of techniques to find out passwords or information in the widely used Office formats such as .docx or .xlsx and other important data types such as .ssh, .crt, .key, .ovpn, or .json exfiltrate.

GraphSteel - Part of the Elephant framework

The complexity and professionalism of such attacks are demonstrated by attacks with GraphSteel, the authors of which are most likely from the environment of the UAC-0056 group. The GraphSteel malware is part of the Elephant framework, a malware toolset written in the Go programming language. Attackers recently used them in a series of phishing attacks against Ukrainian government agencies (gov.ua targets).

First, they started with a sophisticated spear phishing attack. The hackers showed high expertise in social engineering attacks and used spoofed Ukrainian email addresses. The contents of the fake emails were alleged official announcements or topics related to Corona. In an email, the alleged author warned of an increase in Russian cyber attacks, gave security tips and referred to an alleged download of Bitdefender software. The victims compromised their computers either by clicking on a link in the email text or by opening an Excel spreadsheet with embedded macros.

Launcher - dangerous Python script

In some cases, the hackers use a Python script that has been converted to an executable file as a launcher. In other cases, like the entire Elephant framework, they wrote the code in the Go programming language. Perhaps a factor in the decision was that not all security software detects malware written in Go. This in turn is probably due to the fact that programmers, both good and bad, do not use Go very often. Another advantage of the language for the hackers is that the payload can be compiled for both Windows and Linux without changing the code. It is also easy to use and can be extended with third-party malware modules. The launcher then acts as a combination downloader or dropper, connecting the victim system to the command and control server to announce its availability and receive an executable malware payload when the time comes.

Downloader - transports malware

🔎 Typical course of an attack based on the Elephant Framework (Image: Bitdefender).

The downloader then loads two different malware files: GraphSteel (Microsoft-cortana.exe) and GrimPlant (Oracle-java.exe), both of which run automatically. GrimPlant allows to run PowerShell commands remotely. GraphSteel steals data such as access data, certificates, passwords or other sensitive information.

GraphSteel Stealer

The main purpose of GraphSteel is the exfiltration of files, which the malware then transmits encrypted with AES cipher over port 442. The tool uses web sockets and the GraphQL language to communicate with the command and control server. The stealer steals access data for Wifi, Chrome, Firefox as well as data from the password vaults, the Windows Credential Manager or SSH sessions and Thunderbird.

Supposedly on behalf of Bitdefender

🔎 Parallel attacks with two payloads after downloading malware disguised as Bitdefender AV software (Image: Bitdefender).

According to an entry from March 11, 2022 in the CERT-UA, other attacks from the UAC-0056 environment use urgent appeals to increase IT security and to download a supposed Bitdefender antivirus product from a supposed Bitdefender.fr site their attacks. But behind Bitdefender.fr is the domain forkscenter.fr with a spoofed Bitdefender.fr website.

This attack first installs a Discord downloader, which then implements two executable files: Alt.exe, a well-known Go launcher that downloads the Elephant Framework, and One.exe, a Cobalt Strike Beacon. In the end, in the latter case, a cesdf.exe is downloaded, which unfortunately is not available for analysis at the moment because the administrators of the attacked organization have meanwhile switched off their server.

Repelling such complex attacks requires tiered cyber security that can repel an attack during several phases: as early as blocking the phishing email, executing the payload or preventing further compromise and communicating with the C&C -Server.

More at Bitdefender.com

 


About Bitdefender

Bitdefender is a leading global provider of cybersecurity solutions and antivirus software, protecting over 500 million systems in more than 150 countries. Since it was founded in 2001, the company's innovations have consistently ensured excellent security products and intelligent protection for devices, networks and cloud services for private customers and companies. As the supplier of choice, Bitdefender technology is found in 38 percent of security solutions deployed around the world and is trusted and recognized by industry experts, manufacturers and customers alike. www.bitdefender.de


 

Matching articles on the topic

IT security: NIS-2 makes it a top priority

Only in a quarter of German companies do management take responsibility for IT security. Especially in smaller companies ➡ Read more

Cyber ​​attacks increase by 104 percent in 2023

A cybersecurity company has taken a look at last year's threat landscape. The results provide crucial insights into ➡ Read more

Mobile spyware poses a threat to businesses

More and more people are using mobile devices both in everyday life and in companies. This also reduces the risk of “mobile ➡ Read more

Crowdsourced security pinpoints many vulnerabilities

Crowdsourced security has increased significantly in the last year. In the public sector, 151 percent more vulnerabilities were reported than in the previous year. ➡ Read more

Digital Security: Consumers trust banks the most

A digital trust survey showed that banks, healthcare and government are the most trusted by consumers. The media- ➡ Read more

Darknet job exchange: Hackers are looking for renegade insiders

The Darknet is not only an exchange for illegal goods, but also a place where hackers look for new accomplices ➡ Read more

Solar energy systems – how safe are they?

A study examined the IT security of solar energy systems. Problems include a lack of encryption during data transfer, standard passwords and insecure firmware updates. trend ➡ Read more

New wave of phishing: Attackers use Adobe InDesign

There is currently an increase in phishing attacks that abuse Adobe InDesign, a well-known and trusted document publishing system. ➡ Read more