Tuesday, February 11, 2025
HomeCyber Security NewsRussian BlueAlpha APT Exploits Cloudflare Tunnels to Distribute Custom Malware

Russian BlueAlpha APT Exploits Cloudflare Tunnels to Distribute Custom Malware

Published on

SIEM as a Service

Follow Us on Google News

BlueAlpha, a Russian state-sponsored group, is actively targeting Ukrainian individuals and organizations by using spearphishing emails with malicious HTML attachments to deliver GammaLoad malware. 

To evade detection, BlueAlpha is leveraging Cloudflare Tunnels to conceal their infrastructure and using DNS fast-fluxing for their C2 servers, as this ongoing campaign, active since early 2024, highlights the persistent threat posed by Russian cyber actors.

Researchers discovered BlueAlpha abusing free Cloudflare Tunnels to hide their GammaDrop malware staging infrastructure, which is created using randomly generated subdomains and acts as proxies to the actual server. 

GammaLoad infection chain 

This technique is gaining popularity among attackers due to its ease of use and low cost. BlueAlpha leverages tunnels to deliver GammaDrop malware via malicious .lnk files, which highlights a recent trend of attackers using Cloudflare Tunnels to evade detection, as previously observed with RATs like AsyncRAT

Free Webinar on Best Practices for API vulnerability & Penetration Testing:  Free Registration

Attackers switched from using the onmousemove event to the onerror event in an img tag to trigger deobfuscation of malicious JavaScript within an XHTML attachment and also added a message indicating file download completion. 

 Contents of smuggled 7zip archive containing shortcut file 

The JavaScript checks the OS, decodes a smuggled archive, downloads it, and fetches a tracking pixel from a different location than the GammaDrop staging server, potentially revealing an IP address. 

A malicious HTA file is downloaded and executed from the staging server using a shortcut file that is contained within the archive, which makes use of the mshta.exe program. 

BlueAlpha attackers use GammaDrop, an obfuscated HTA payload, to deploy GammaLoad, a custom VBScript backdoor, where GammaDrop writes GammaLoad to the user profile directory and sets persistence using a run key unless specific security software is running. 

Main function of GammaLoad 

It also opens a blank Word document and stores a C2 IP address in a hidden file. GammaLoad then beacons to the C2 server, sending victim information and retrieving encoded VBScript for further malicious actions. 

Several different methods, such as plain text HTTP, fast-flux DNS, and DNS over HTTPS (DoH), are utilized for communication between the two computers in order to avoid detection. 

According to Insikt Group, to defend against HTML smuggling attacks with embedded JavaScript, users should implement email security solutions that inspect and block suspicious HTML with events like “onerror” and “onmousemove.” 

Application control policies should restrict execution of “mshta.exe” and untrusted “.lnk” files. Endpoint detection should monitor “mshta.exe” activity for suspicious command-line arguments. 

Network traffic to TryCloudflare subdomains and unauthorized DoH connections should be flagged for review, while leveraging threat intelligence platforms to analyze suspicious files, monitor real-time network activity for targeted attacks and stay updated on attacker tactics and indicators of compromise.

Analyse Real-World Malware & Phishing Attacks With ANY.RUN - Get up to 3 Free Licenses

Varshini
Varshini
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Latest articles

Fortinet FortiOS & FortiProxy Zero-Day Exploited to Hijack Firewall & Gain Super Admin Access

Cybersecurity firm Fortinet has issued an urgent warning regarding a newly discovered zero-day authentication...

Microsoft Patch Tuesday February 2025: 61 Vulnerabilities Including 25 RCE & 3 0-Day

Microsoft has released its highly anticipated Patch Tuesday security updates for February 2025, addressing...

Preventing Attackers from Permanently Deleting Entra ID Accounts with Protected Actions

Microsoft Entra ID has introduced a robust mechanism called protected actions to mitigate the...

Beyond the Horizon: Assessing the Viability of Single-Bit Fault Injection Attacks

The realm of fault injection attacks has long intrigued researchers and security professionals.Among...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Fortinet FortiOS & FortiProxy Zero-Day Exploited to Hijack Firewall & Gain Super Admin Access

Cybersecurity firm Fortinet has issued an urgent warning regarding a newly discovered zero-day authentication...

Microsoft Patch Tuesday February 2025: 61 Vulnerabilities Including 25 RCE & 3 0-Day

Microsoft has released its highly anticipated Patch Tuesday security updates for February 2025, addressing...

Preventing Attackers from Permanently Deleting Entra ID Accounts with Protected Actions

Microsoft Entra ID has introduced a robust mechanism called protected actions to mitigate the...