Saturday, May 3, 2025
Homecyber securityGamaredon Hackers Weaponize LNK Files to Deliver Remcos Backdoor

Gamaredon Hackers Weaponize LNK Files to Deliver Remcos Backdoor

Published on

SIEM as a Service

Follow Us on Google News

Cisco Talos has uncovered an ongoing cyber campaign by the Gamaredon threat actor group, targeting Ukrainian users with malicious LNK files to deliver the Remcos backdoor.

Active since at least November 2024, this campaign employs spear-phishing tactics, leveraging themes related to the Ukraine conflict to lure victims into executing the malicious files.

The LNK files, disguised as Office documents, are distributed within ZIP archives and carry filenames referencing troop movements and other war-related topics in Russian or Ukrainian.

- Advertisement - Google News

The attack begins with the execution of a PowerShell downloader embedded in the LNK file.

This downloader contacts geo-fenced servers located in Russia and Germany to retrieve a second-stage ZIP payload containing the Remcos backdoor.

The downloaded payload employs DLL sideloading techniques to execute the backdoor, a method that involves loading malicious DLLs through legitimate applications. This approach enables attackers to bypass traditional detection mechanisms.

Sophisticated Delivery Mechanisms

Gamaredon’s phishing emails likely include either direct attachments of the ZIP files or URLs redirecting victims to download them.

The campaign’s filenames, such as “Coordinates of enemy takeoffs for 8 days” or “Positions of the enemy west and southwest,” suggest a deliberate attempt to exploit sensitive geopolitical themes.

Metadata analysis indicates that only two machines were used to create these malicious shortcut files, consistent with Gamaredon’s operational patterns observed in previous campaigns.

The PowerShell scripts embedded in the LNK files use obfuscation techniques, such as leveraging the Get-Command cmdlet, to evade antivirus detection. Once executed, these scripts download and extract the ZIP payload into the %TEMP% folder.

The payload includes clean binaries that load malicious DLLs, which decrypt and execute the final Remcos backdoor payload.

This backdoor is injected into Explorer.exe and communicates with command-and-control (C2) servers hosted on infrastructure primarily based in Germany and Russia.

Targeted Infrastructure and Indicators of Compromise

The campaign’s C2 servers are hosted by Internet Service Providers such as GTHost and HyperHosting.

Notably, Gamaredon restricts access to these servers based on geographic location, limiting them to Ukrainian victims.

Reverse DNS records for some of these servers reveal unique artifacts that have helped researchers identify additional IP addresses associated with this operation.

The Remcos backdoor itself provides attackers with robust capabilities for remote control, including data exfiltration and system manipulation.

Cisco Talos has observed evidence of clean applications like TivoDiag.exe being abused for DLL sideloading during this campaign.

Gamaredon’s use of advanced techniques such as DLL sideloading, geo-fenced infrastructure, and thematic phishing underscores its persistence in targeting Ukraine amidst ongoing geopolitical tensions.

Organizations are advised to remain vigilant against such threats by implementing robust endpoint protection, email security measures, and network monitoring solutions.

IOCs for this threat can be found in our GitHub repository here.    

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Subscription-Based Scams Targeting Users to Steal Credit Card Information

Cybersecurity researchers at Bitdefender have identified a significant uptick in subscription-based scams, characterized by...

RansomHub Taps SocGholish: WebDAV & SCF Exploits Fuel Credential Heists

SocGholish, a notorious loader malware, has evolved into a critical tool for cybercriminals, often...

Hackers Weaponize Go Modules to Deliver Disk‑Wiping Malware, Causing Massive Data Loss

Cybersecurity researchers uncovered a sophisticated supply chain attack targeting the Go programming language ecosystem...

Hundreds of Fortune 500 Companies Have Unknowingly Employed North Korean IT Operatives

North Korean nationals have successfully infiltrated the employee ranks of major global corporations at...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Subscription-Based Scams Targeting Users to Steal Credit Card Information

Cybersecurity researchers at Bitdefender have identified a significant uptick in subscription-based scams, characterized by...

RansomHub Taps SocGholish: WebDAV & SCF Exploits Fuel Credential Heists

SocGholish, a notorious loader malware, has evolved into a critical tool for cybercriminals, often...

Hackers Weaponize Go Modules to Deliver Disk‑Wiping Malware, Causing Massive Data Loss

Cybersecurity researchers uncovered a sophisticated supply chain attack targeting the Go programming language ecosystem...