Tuesday, May 6, 2025
HomeCyber AttackOperation Oxidovy, Threat Actors Targeting Government And Military Officials

Operation Oxidovy, Threat Actors Targeting Government And Military Officials

Published on

SIEM as a Service

Follow Us on Google News

The recent campaign targeting the Czech Republic involves a malicious ZIP file that contains a decoy LNK file and a batch script.

The LNK runs the batch script, which spawns a decoy PDF document and renames a masqueraded PDF file to a portable executable, which is copied to the startup folder for persistence. 

Decoy documents are likely used to lure the target into opening the malicious file, and the entire malware ecosystem, including HavocC2 and Freeze, is involved in this campaign.

- Advertisement - Google News

The two decoy documents analyzed are “Password Change from the Internal Network of the Ministry of Defense (IMO)” and “The importance of and outlook for the Czech Republic in NATO.”

The first document instructs users to change their passwords by navigating to a specific URL and adhering to password complexity guidelines. 

final page of the decoy document

The second document discusses the importance of relations between the Czech Republic and NATO, including geopolitical advantages and current security issues. 

The first decoy document is irrelevant to the initial ZIP file name, while the second document is thematically relevant, which suggests that the attacker may be using a watering hole attack, targeting users interested in Czech Republic-NATO relations.

A ZIP file contains a malicious LNK file that spawns a malicious batch script, which changes the attributes of decoy documents and renames a masqueraded PDF to “AdobeReader.exe,” copying it to the Startup folder for execution.

The script also hides and protects the LNK file and payload from unauthorized modification or deletion. 

Infection Chain

Rust-based loader known as Freeze is then executed, which uses ETW patching to bypass EDRs, unhooks DLLs, repatches ETW, and decodes and decrypts shellcode, which is a malicious Havoc DLL that contains subroutines for loading modules, retrieving functions, and facilitating payload activities.

The extracted configuration specifies the execution path for both 32-bit and 64-bit architectures, the HTTP method for communication, and the Command and Control server address. 

The DemonConfig function parses this configuration from the .data section for further use and generates unique metadata for the payload, including identifying information and system details. 

 Malicious Havoc Demon

It establishes a connection to the Command and Control server, decrypts received data using AES encryption, processes tasks using the CommandDispatcher, and employs sleep obfuscation techniques to avoid detection.

Seqrite identified a targeted attack against the Czech military likely originating from Russia, where the attackers used a custom Rust-based loader (AdobeReader.exe) with a unique PDB path to deploy a Havoc Demon shellcode (demon.x64.dll). 

Further analysis revealed another loader (gnobya.exe) from May 2024 that downloaded a Sliver Stager.

Both loaders used open-source tools and targeted the Czech Republic, while the C2 servers were located in the Netherlands and Bulgaria. 

Download FreeIncident Response Plan Templatefor Your Security Team – Free Download

Kaaviya
Kaaviya
Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Latest articles

Hackers Bypass AI Filters from Microsoft, Nvidia, and Meta Using a Simple Emoji

Cybersecurity researchers have uncovered a critical flaw in the content moderation systems of AI...

Microsoft Alerts That Default Helm Charts May Expose Kubernetes Apps to Data Leaks

Microsoft’s cybersecurity research team has issued a stark warning about the risks of using...

Popular Instagram Blogger’s Account Hacked to Phish Users and Steal Banking Credentials

A high-profile Russian Instagram blogger recently fell victim to a sophisticated cyberattack, where scammers...

Ransomware Attacks on Food & Agriculture Industry Surge 100% – 84 Attacks in Just 3 Months

The food and agriculture industry is facing an unprecedented wave of cybersecurity threats in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Popular Instagram Blogger’s Account Hacked to Phish Users and Steal Banking Credentials

A high-profile Russian Instagram blogger recently fell victim to a sophisticated cyberattack, where scammers...

Ransomware Attacks on Food & Agriculture Industry Surge 100% – 84 Attacks in Just 3 Months

The food and agriculture industry is facing an unprecedented wave of cybersecurity threats in...

Hackers Targeting Schools and Universities in New Mexico with Cyber Attacks

A major cyberattack on the Coweta County School System's computer network occurred late Friday night, which is a worrying development for New Mexico's educational institutions. The unauthorized intrusion, detected around 7:00 p.m., prompted immediate action from the school...