A rare overlap in malware delivery and targets recently between two separate and traditionally very different Russian hacking groups appears to indicate some type of pooling of their resources.
Researchers from Kaspersky Lab spotted Turla – aka Venemous Bear/Snake/Uroburos – using the same method of malware delivery used by Zebrocy, a subgroup of Sofacy – aka Fancy Bear/APT 28 – with each going after some of the same geopolitical targets in central Asia.
Costin Raiu, director of Kaspersky's global research and analysis team, says it's either that the two groups have access to the same developer resources or they're working together. "We still believe they are separate groups," he says. In its latest attack campaign, Turla used an LNK file with PowerShell encryption code that was nearly identical to that of Zebrocy's, according to Raiu.
Zebrocy is a lesser-known arm of Sofacy. "Zebrocy is interesting because there's very little talk about them. Most big, high-profile attacks are attributed to Sofacy," he says.
Turla, which at one time was mostly targeting Ukraine, now appears more focused on foreign affairs targets in regions including East Asia as well as Europe. It's one of the oldest and longest-running advanced hacking teams in the world and is known to be stubbornly resilient.
Unlike Sofacy, which stays the course even after it gets outed, Turla is known to shift tactics once it's discovered.
Raiu's team discovered a new version of Turla's KopiLuwak malware dropper going after targets in Afghanistan and Syria. The attackers in their spear-phishing attacks deployed malicious Windows LNK files with PowerShell, which decoded and installed KopiLuwak, the actual payload. That PowerShell-based installer was a dead ringer for the one used by Zebrocy a month ago, according to the researchers.
"The most recent evolution in the KopiLuwak life cycle was observed in mid-2018 when we observed a very small set of systems in Syria and Afghanistan being targeted with a new delivery vector," Kaspersky researchers wrote in a paper they presented at the Virus Bulletin conference in Montreal last week. "In this campaign the KopiLuwak backdoor was encoded and delivered in a Windows shortcut (.lnk) file. The lnk files were an especially interesting development because the powershell code they contain for decoding and dropping the payload is nearly identical to that utilized by the Zebrocy threat actor a month earlier."
Meanwhile, Raiu says all appears quiet on the election hacking scene. He hasn't seen any hacking attempts by Sofacy or others related to the US midterm elections at this point. "If we were to see something nowadays, it would probably influence operations mostly. But we haven't seen anything significant in terms of malware operations [here]," he says.
- US Indicts 7 Russian Intel Officers for Hacking Anti-Doping Organizations
- Mueller Probe Yields Hacking Indictments for 12 Russian Military Officers
- 13 Russians Indicted for Massive Operation to Sway US Election
- 8 Notorious Russian Hackers Arrested in the Past 8 Years
Black Hat Europe returns to London Dec 3-6 2018 with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.