Saturday, April 5, 2025
HomeCyber AttackRussian APT Hackers Group Attack Government & Military Network Using Weaponized Word...

Russian APT Hackers Group Attack Government & Military Network Using Weaponized Word Documents

Published on

SIEM as a Service

Follow Us on Google News

Researchers discovered a new malicious activity that involved by Russian APT hackers to attack Government and Military officials in Ukrainian entities.

The attacker’s targets are not limited but they also infect various individuals who is part of the government and Law enforcement, Journalists, Diplomats, NGO and the Ministry of Foreign Affairs.

Researchers believe that the campaign attributed to Gamaredon activity in which attackers using Dynamic Domain Name Server as C2 server, VBA macro, and VBA script as a part of this attack.

Threat actors using weaponized DOCX files during the intelligence collection in the target and its distributed via spearphishing emails.

Gamaredon is using weaponized documents, sometimes retrieved from legitimate sources as the initial infection vector.

Researchers observed the malicious sample that reveals the APT activity from at least September 2019 to November 25, 2019.

Malware infection Process

Researchers observed some of the lure documents that contain various indications of body contents that include the document that appears to discuss requirements instituted by the Chief of the General Staff, the Nongovernmental Organization (NGO) media watchdog organization and some of the other fake claims to trick victims to gain attention.

These malicious documents appear in phishing emails that contain a malicious attachment that doesn’t contain any VBA macros, instead, attackers using the Template Injection technique to downloads a Document Template (.dot) from a remote location.

Russian APT
Template file (.dot) downloaded from remote URL

The downloaded template file contains VBA macros, which are automatically get executed in the background.

Russian APT
Infection chain

The VBA Macro writes a VBScript file to the startup folder to be executed on startup and it tries to change the registry that disables the Macro security warnings in the future.

According to Anomali research ” A file will only be sent if the actor determines that the now infected target is worthy of a second-stage payload, otherwise, the file deletion continues on its loop to remove evidence of the actor’s activity.”

“Russian-sponsored cyber capabilities have been well-documented over numerous malicious campaigns found and attributed by the security community, and this activity observed by ATR indicates the risk posed to entities by APT threat groups.”

APT hacker group activities are continuously evolving in wide. very recently we have reported, Lazarus and OceanLotus APT hackers activities.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

Hackers Use URL Shorteners and QR Codes in Tax-Themed Phishing Attacks

As the United States approaches Tax Day on April 15, cybersecurity experts have uncovered...

Beware of Clickfix: ‘Fix Now’ and ‘Bot Verification’ Lures Deliver and Execute Malware

A sophisticated browser-based malware delivery method, dubbed ClickFix, has emerged as a significant threat...