Perimeter

10/10/2018
07:00 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Russian Hacking Groups Intersect in Recent Cyberattacks

Two different hacking teams best known as Turla and Fancy Bear employed the same stealthy attack method in an unusual overlap of hacking activity.

A rare overlap in malware delivery and targets recently between two separate and traditionally very different Russian hacking groups appears to indicate some type of pooling of their resources.

Researchers from Kaspersky Lab spotted Turla – aka Venemous Bear/Snake/Uroburos – using the same method of malware delivery used by Zebrocy, a subgroup of Sofacy – aka Fancy Bear/APT 28 – with each going after some of the same geopolitical targets in central Asia.

Specifically, Turla dropped its JavaScript-based KopiLuwak backdoor malware in much the same manner as Zebrocy had dropped its malware a month before in other attacks. 

Costin Raiu, director of Kaspersky's global research and analysis team, says it's either that the two groups have access to the same developer resources or they're working together. "We still believe they are separate groups," he says. In its latest attack campaign, Turla used an LNK file with PowerShell encryption code that was nearly identical to that of Zebrocy's, according to Raiu.

Zebrocy is a lesser-known arm of Sofacy. "Zebrocy is interesting because there's very little talk about them. Most big, high-profile attacks are attributed to Sofacy," he says.

Turla, which at one time was mostly targeting Ukraine, now appears more focused on foreign affairs targets in regions including East Asia as well as Europe. It's one of the oldest and longest-running advanced hacking teams in the world and is known to be stubbornly resilient.

"One thing about Turla is at some point once they get detected, they get rid of the malware, and in six months they are back," Raiu says. Sometimes they plant five or six different pieces of malware in a target's network that's often well-hidden, including PowerShell and JavaScript-based malware.

"They have so many tools at their disposal," including polymorphic JavaScript implants that are difficult to detect, Raiu says.

Unlike Sofacy, which stays the course even after it gets outed, Turla is known to shift tactics once it's discovered.

Raiu's team discovered a new version of Turla's KopiLuwak malware dropper going after targets in Afghanistan and Syria. The attackers in their spear-phishing attacks deployed malicious Windows LNK files with PowerShell, which decoded and installed KopiLuwak, the actual payload. That PowerShell-based installer was a dead ringer for the one used by Zebrocy a month ago, according to the researchers.

"The most recent evolution in the KopiLuwak life cycle was observed in mid-2018 when we observed a very small set of systems in Syria and Afghanistan being targeted with a new delivery vector," Kaspersky researchers wrote in a paper they presented at the Virus Bulletin conference in Montreal last week. "In this campaign the KopiLuwak backdoor was encoded and delivered in a Windows shortcut (.lnk) file. The lnk files were an especially interesting development because the powershell code they contain for decoding and dropping the payload is nearly identical to that utilized by the Zebrocy threat actor a month earlier."

Meanwhile, Raiu says all appears quiet on the election hacking scene. He hasn't seen any hacking attempts by Sofacy or others related to the US midterm elections at this point. "If we were to see something nowadays, it would probably influence operations mostly. But we haven't seen anything significant in terms of malware operations [here]," he says.

Related Content:

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
2019 Attacker Playbook
Ericka Chickowski, Contributing Writer, Dark Reading,  12/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
[Sponsored Content] The State of Encryption and How to Improve It
[Sponsored Content] The State of Encryption and How to Improve It
Encryption and access controls are considered to be the ultimate safeguards to ensure the security and confidentiality of data, which is why they're mandated in so many compliance and regulatory standards. While the cybersecurity market boasts a wide variety of encryption technologies, many data breaches reveal that sensitive and personal data has often been left unencrypted and, therefore, vulnerable.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19790
PUBLISHED: 2018-12-18
An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restricti...
CVE-2018-19829
PUBLISHED: 2018-12-18
Artica Integria IMS 5.0.83 has CSRF in godmode/usuarios/lista_usuarios, resulting in the ability to delete an arbitrary user when the ID number is known.
CVE-2018-16884
PUBLISHED: 2018-12-18
A flaw was found in the Linux kernel in the NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel id and cause a use-after-free. Thus a malicious container user can cause a host kernel memory corruption and a system ...
CVE-2018-17777
PUBLISHED: 2018-12-18
An issue was discovered on D-Link DVA-5592 A1_WI_20180823 devices. If the PIN of the page "/ui/cbpc/login" is the default Parental Control PIN (0000), it is possible to bypass the login form by editing the path of the cookie "sid" generated by the page. The attacker will have acc...
CVE-2018-18921
PUBLISHED: 2018-12-18
PHP Server Monitor before 3.3.2 has CSRF, as demonstrated by a Delete action.