Start your day with intelligence. Get The OODA Daily Pulse.
In an update to our recent analysis of the continued expansion of cyber incidents by non-state actors in the war in Europe, the following is a sampling of the most recent, attributed, known major cyber incidents and non-state actor cyber activity (mainly centered around the conflict in Ukraine) of the last two months.
The China-linked cyberspy group APT31 is believed to be behind a data-theft campaign targeting industrial organizations in Eastern Europe.
Cybersecurity firm Kaspersky observed a new APT31 campaign targeting industrial organizations in Eastern Europe. APT31, also known as Zirconium, Judgement Panda, Bronze Vinewood, and Red Keres, is strongly linked to the Chinese government.
The attacks occurred in 2022, and Kaspersky recently concluded its investigation. Instead of attacking industrial control systems, the hackers sought to establish permanent data-theft channels through malware-infected removable drives. The group used two variants of malware, FourteenHi and MeatBall. The first is capable of uploading or downloading files, running commands, and initiating reverse shells. The second establishes extensive remote access capabilities. Kaspersky’s report includes indicators of compromise, technical details, and an overview of the tactics APT31 employed during this campaign. (1)
Confiscated SIM cards. Image: Ukraine Cyber Police (Image Source: The Record)
A summary from The Record on a Russian bot farm pushing out kompromat:
“Ukraine‘s Cyber Police shut down yet another bot farm that was reportedly spreading disinformation about the war in Ukraine on social media, just one month after a similar illicit operation was raided in west-central Ukraine. Here’s what you need to know:
A summary from The Record on Turla-led Russian espionage efforts via malware:
The Russian hacking group Turla is attacking Ukrainian defense forces with spying malware, according to new research from the country’s computer emergency response team (CERT-UA). Here’s what you need to know:
“The Moscow-linked hacking group known as Armageddon remains one of the most active and dangerous threat actors targeting Ukraine during its war with Russia, according to recent research. Here’s what you need to know:
The Shuckworm espionage group, believed to be linked to the Russian FSB, has intensified cyber-attacks on Ukraine, targeting military and security intelligence. The campaign involved phishing emails with malicious attachments, deploying backdoors and tools, and spreading custom malware via USB drives. The group displayed persistence, updating its toolset and leveraging legitimate services for command-and-control infrastructure. To mitigate such attacks, organizations are advised to assess the risk of using USB devices, scan them with antivirus software, and educate users to identify and report phishing attempts. (3)
Microsoft has publicly identified a new APT group called Cadet Blizzard, associated with Russia’s GRU, which has carried out destructive cyber attacks in Ukraine using wiper malware. The group is linked to defacements of Ukrainian organization websites and the hack-and-leak Telegram channel “Free Civilian.” Microsoft has been tracking Cadet Blizzard since January 2022 and believes it has been operational since 2020, targeting government organizations and IT providers in Ukraine, Europe, and Latin America. The group maintains long-term access to compromised networks and exfiltrates data before launching disruptive attacks. Cadet Blizzard has received support from at least one Russian private sector organization. (4)
“The DDoSia project by pro-Russian hackers has seen significant growth this year as attackers continue to use the technology against countries critical of Russia’s invasion of Ukraine. DDoSia is a distributed denial-of-service attack toolkit developed and used by the pro-Russia hacktivist group NoName057(16). The group and its followers are actively deploying the tool against government agencies, media, and private companies in Lithuania, Ukraine, Poland, Italy, and other European countries, according to a report released by cybersecurity company Sekoia [which] detected a total of 486 different websites impacted by DDoSia attacks. Among them are incidents involving Latvia’s parliament and Poland’s tax service.
NoName057(16) also targeted education-related websites during the exam period in Ukraine in May and June, allegedly to maximize the media coverage of their DDoS operation, Sekoia said. The group typically targets 15 different victims per day. Sekoia only observed one incident when the group attacked a single victim — Russia’s Wagner private mercenary army during its attempted military coup in June. DDoS attacks are designed to overwhelm network resources with traffic to effectively take them offline.
Telegram communications
“Pro-Ukrainian hacktivists have hit a Russian internet and telecommunications company used mostly by banks and online stores with a “massive” cyberattack.Infotel released a statement on its website…confirming that the cyber operation had hit its target:
‘We inform you that as a result of a massive hacker attack on the Infotel network, part of the network equipment was damaged,’ the company said. ‘Restoration work is currently underway. Additional deadlines for completing the work will be announced.’ As of the time of writing, some of the services listed on its website are still unavailable.
A group of pro-Ukrainian hacktivists calling themselves the Cyber Anarchy Squad claimed responsibility for the attack. ‘We have completely destroyed their infrastructure. There is nothing left alive. Let them try to restore it now, but their chances are as slim as finding an easy life in Russia,’ the hackers wrote on their Telegram channel. The Moscow-based company provides services to Russia’s Central Bank and connects it to local banks, financial companies, and online stores. The attack may cause issues for Russian businesses in accessing banking systems and making payments, hackers said. Aside from disrupting Infotel services, the hackers claim to have accessed certain intelligence, including a list of customers and their email correspondences.” (6)
https://oodaloop.com/archive/2023/07/06/the-continued-expansion-of-cyber-incidents-by-non-state-actors-in-the-war-in-europe/