Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


12:10 PM

'Highly Active' APT Group Targeting Microsoft Office, Outlook

The Gamaredon group has ramped up activity in recent months and makes no effort to stay under the radar, researchers report.

The "highly active" Gamaredon APT group has been using several previously undocumented post-compromise attack tools in malicious campaigns, which ESET researchers report have been increasing over the past few months. Many of these tools target Microsoft Office and Outlook.

Gamaredon has been active since at least 2013 and mostly targeted Ukrainian institutions, the research team reports in a new analysis, citing reports from CERT-UA and Ukrainian institutions. A recent increase in activity has brought "constant waves" of malicious emails with attachments packing malicious macros that, when executed, try to download different malware variants.

"The tools used by Gamaredon are very simple and are designed to gather sensitive information from compromised systems and to spread further," researchers say in a blog post. Even though its tools could download more subtle binaries, the group seems primarily focused on spreading far and fast in target networks. Unlike other APT groups, Gamaredon makes no effort to hide.

A closer look at post-compromise tools revealed a VBA macro targeting Microsoft Outlook that uses a victim's email account to send spear-phishing email to contacts in their Office address book. Using Outlook macros to send malware is rare in malicious campaigns, researchers note.

Their analysis also inspected variants of modules the Gamaredon group uses to inject malicious macros or remote templates into documents on the compromised system. This is an efficient way of moving throughout a network because employees commonly share files. And because macros are run when files are opened, it's a handy way to remain persistent as files are often opened several times. These modules are able to adjust Office macro security settings, researchers found, meaning a victim doesn't know they are compromised when they open malicious files.

Read the full report here.

Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that "really   bad day" in cybersecurity. Click for more information and to register
Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/14/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-14
SAP NetWeaver AS JAVA (LM Configuration Wizard), versions - 7.30, 7.31, 7.40, 7.50, does not perform an authentication check which allows an attacker without prior authentication to execute configuration tasks to perform critical actions against the SAP Java system, including the ability to create a...
PUBLISHED: 2020-07-14
SAP Disclosure Management, version 10.1, had insufficient protection against Cross-Site Request Forgery, which could be used to trick user in to browsing malicious site.
PUBLISHED: 2020-07-14
SAP Disclosure Management, version 10.1, is vulnerable to Session Fixation attacks wherein the attacker tricks the user into using a specific session ID.
PUBLISHED: 2020-07-14
SAP Disclosure Management, version 10.1, session mechanism does not have expiration data set therefore allows unlimited access after authenticating once, leading to Insufficient Session Expiration
PUBLISHED: 2020-07-14
Logout mechanism in SAP Disclosure Management, version 10.1, does not invalidate one of the session cookies, leading to Insufficient Session Expiration.