Perimeter

10/10/2018
07:00 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Russian Hacking Groups Intersect in Recent Cyberattacks

Two different hacking teams best known as Turla and Fancy Bear employed the same stealthy attack method in an unusual overlap of hacking activity.

A rare overlap in malware delivery and targets recently between two separate and traditionally very different Russian hacking groups appears to indicate some type of pooling of their resources.

Researchers from Kaspersky Lab spotted Turla – aka Venemous Bear/Snake/Uroburos – using the same method of malware delivery used by Zebrocy, a subgroup of Sofacy – aka Fancy Bear/APT 28 – with each going after some of the same geopolitical targets in central Asia.

Specifically, Turla dropped its JavaScript-based KopiLuwak backdoor malware in much the same manner as Zebrocy had dropped its malware a month before in other attacks. 

Costin Raiu, director of Kaspersky's global research and analysis team, says it's either that the two groups have access to the same developer resources or they're working together. "We still believe they are separate groups," he says. In its latest attack campaign, Turla used an LNK file with PowerShell encryption code that was nearly identical to that of Zebrocy's, according to Raiu.

Zebrocy is a lesser-known arm of Sofacy. "Zebrocy is interesting because there's very little talk about them. Most big, high-profile attacks are attributed to Sofacy," he says.

Turla, which at one time was mostly targeting Ukraine, now appears more focused on foreign affairs targets in regions including East Asia as well as Europe. It's one of the oldest and longest-running advanced hacking teams in the world and is known to be stubbornly resilient.

"One thing about Turla is at some point once they get detected, they get rid of the malware, and in six months they are back," Raiu says. Sometimes they plant five or six different pieces of malware in a target's network that's often well-hidden, including PowerShell and JavaScript-based malware.

"They have so many tools at their disposal," including polymorphic JavaScript implants that are difficult to detect, Raiu says.

Unlike Sofacy, which stays the course even after it gets outed, Turla is known to shift tactics once it's discovered.

Raiu's team discovered a new version of Turla's KopiLuwak malware dropper going after targets in Afghanistan and Syria. The attackers in their spear-phishing attacks deployed malicious Windows LNK files with PowerShell, which decoded and installed KopiLuwak, the actual payload. That PowerShell-based installer was a dead ringer for the one used by Zebrocy a month ago, according to the researchers.

"The most recent evolution in the KopiLuwak life cycle was observed in mid-2018 when we observed a very small set of systems in Syria and Afghanistan being targeted with a new delivery vector," Kaspersky researchers wrote in a paper they presented at the Virus Bulletin conference in Montreal last week. "In this campaign the KopiLuwak backdoor was encoded and delivered in a Windows shortcut (.lnk) file. The lnk files were an especially interesting development because the powershell code they contain for decoding and dropping the payload is nearly identical to that utilized by the Zebrocy threat actor a month earlier."

Meanwhile, Raiu says all appears quiet on the election hacking scene. He hasn't seen any hacking attempts by Sofacy or others related to the US midterm elections at this point. "If we were to see something nowadays, it would probably influence operations mostly. But we haven't seen anything significant in terms of malware operations [here]," he says.

Related Content:

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-1848
PUBLISHED: 2018-12-14
IBM Business Automation Workflow 18.0.0.0 and 18.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force...
CVE-2018-1977
PUBLISHED: 2018-12-14
IBM DB2 for Linux, UNIX and Windows 11.1 (includes DB2 Connect Server) contains a denial of service vulnerability. A remote, authenticated DB2 user could exploit this vulnerability by issuing a specially-crafted SELECT statement with TRUNCATE function. IBM X-Force ID: 154032.
CVE-2018-18006
PUBLISHED: 2018-12-14
Hardcoded credentials in the Ricoh myPrint application 2.9.2.4 for Windows and 2.2.7 for Android give access to any externally disclosed myPrint WSDL API, as demonstrated by discovering API secrets of related Google cloud printers, encrypted passwords of mail servers, and names of printed files.
CVE-2018-18984
PUBLISHED: 2018-12-14
Medtronic CareLink 2090 Programmer CareLink 9790 Programmer 29901 Encore Programmer, all versions, The affected products do not encrypt or do not sufficiently encrypt the following sensitive information while at rest PII and PHI.
CVE-2018-19003
PUBLISHED: 2018-12-14
GE Mark VIe, EX2100e, EX2100e_Reg, and LS2100e Versions 03.03.28C to 05.02.04C, EX2100e All versions prior to v04.09.00C, EX2100e_Reg All versions prior to v04.09.00C, and LS2100e All versions prior to v04.09.00C The affected versions of the application have a path traversal vulnerability that fails...