Tuesday, March 19, 2024

Russian APT29 Used 30+ C&C Servers Uncovered Linked to “WellMess” Malware

Researchers from RISKIQ uncovered more than 30 commands & control server infrastructure actively serving malware known as “WellMess/WellMail”.

These C2 servers belong to Russian APT29 group hackers, and the gang was identified nearly a year back by the UK, US, and Canadian governments issued a joint advisory.

APT29(YTTRIUM, THE DUKES, COZY BEAR) group explicitly believed to be associated with Russia’s Foreign Intelligence Services (SVR) and the malware previously used in espionage campaigns targeting COVID-19 research in the UK, US, and Canada.

Identified command & control servers are actively serving WellMess malware against highly targeted victims.

“The activity uncovered was notable given the context in which it appeared, coming on the heels of a public reproach of Russian hacking by President Joe Biden in a recent summit with President Vladimir Putin.” RISKIQ said.

‘WellMess’ is a custom malware used to target the number of victims globally, and the group is mainly using the recently published exploits to gain initial footholds.

A Tweets Leads to the Way

Researchers’ investigation begins with the Tweet that contains an indicator about the command and control server and the signed certificate.

Further analysis leads to uncovering several additional IP addresses and  Certificates, also revealed that the C2 server associated with the APT29 and WellMess.

The identified C2 infrastructure is actively used by APT 29, Also found new IP addresses residing in the same networks.

“Building on that discovery, RiskIQ’s Team Atlas was then able to leverage RiskIQ’s Internet Intelligence Graph to link the following SSL Certificates and IP addresses to APT29 C2 infrastructure with high confidence.”

When researchers examined the banners returned from HTTP requests made to the servers, they were able to found an entirely separate group of malicious certificates and IP addresses.

You can explore the full list of these IOCs Here.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

900+ websites Exposing 10M+ Passwords: Most in Plaintext

Over 900 websites inadvertently expose over 10 million passwords, many of which are in...

Hackers Exploiting Microsoft Office Templates to Execute Malicious Code

In a cyberattack campaign dubbed "PhantomBlu," hundreds of employees across various US-based organizations were...

How ANY.RUN Malware Sandbox Process IOCs for Threat Intelligence Lookup?

The database includes indicators of compromise (IOCs) and relationships between different artifacts observed within...

CryptoWire Ransomware Attacking Abuses Schedule Task To maintain Persistence

AhnLab security researchers detected a resurgence of CryptoWire, a ransomware strain originally prevalent in...

E-Root Admin Sentenced to 42 Months in Prison for Selling 350,000 Credentials

Tampa, FL – In a significant crackdown on cybercrime, Sandu Boris Diaconu, a 31-year-old...

WhiteSnake Stealer Checks for Mutex & VM Function Before Execution

A new variant of the WhiteSnake Stealer, a formidable malware that has been updated...

Researchers Hacked AI Assistants Using ASCII Art

Large language models (LLMs) are vulnerable to attacks, leveraging their inability to recognize prompts...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles