Tuesday, June 25, 2024

Russian APT28 Hacking Group Tracked Using a Variant X-Agent Delivering Via JPG File

Security researchers from Z-Lab at CSE Cybsec observed series of malware submitted to the online sandbox and a sample submitted to Virus Total that was attributed by some experts to the Russian APT28 group.

The APT28 group (aka Fancy Bear, Pawn Storm, Sednit, Sofacy, and Strontium) active since 2007 and they involved in various attacks including the 2016 Presidential election.

Researchers from Z-Lab along with researcher with twitter handle @DrunkBinary obtained a collection of samples that appear to be the new version of APT28 backdoor tracked as X-Agent.

APT28 Group – Multi-stage Attack

The attack appears to be multi-stage one, it first drops an initial dropper malware that written in Delphi programming language and the second one is the payload downloaded from the Internet.

APT28 group

To avoid eavesdropping connection to the server made through HTTPS protocol and the hacker group having C2C servers in Europe and another one in China.

The malware connected with command and control with the name marina-info[.]net that refers to the Italian Military corp, Marina Militare.

Same Malware Behind the Samples

Researchers uncovered four samples used in the campaign and all the four appears to be the same malware sample. The sample contains two files “.lnk” file and a “jpg” file.

But the jpg file is executable, once it executed it connects with IP 45.124.132.127 and periodically send operating system details.

Once it information sent to the C2 server it drops another file “upnphost[.]exe” which is the final payload.

This file was retrieved from the threat intelligence platforms and was flagged as an APT28 sample. Another characteristic in common is the Delphi programming language which is rare to find a malware written in Delphi language.

Here you can find the analysis Analysis report, IoCs and Yara Rules.

Website

Latest articles

Threat Actor Claiming a 0-day in Linux LPE Via GRUB bootloader

A new threat actor has emerged, claiming a zero-day vulnerability in the Linux GRUB...

LockBit Ransomware Group Claims Hack of US Federal Reserve

The notorious LockBit ransomware group has claimed responsibility for hacking the U.S. Federal Reserve,...

Microsoft Power BI Vulnerability Let Attackers Access Organizations Sensitive Data

A vulnerability in Microsoft Power BI allows unauthorized users to access sensitive data underlying...

Consulting Companies to Pay $11 Million Failing Cybersecurity Requirements

Two consulting companies, Guidehouse Inc. and Nan McKay and Associates, have agreed to pay...

New RAT Malware SneakyChef & SugarGhost Attack Windows Systems

Talos Intelligence has uncovered a sophisticated cyber campaign attributed to the threat actor SneakyChef....

Chinese Winnti Group Intensifies Financially Motivated Attacks

Hackers are increasingly executing financially motivated attacks and all due to the lucrative potential...

PrestaShop Website Under Injection Attack Via Facebook Module

A critical vulnerability has been discovered in the "Facebook" module (pkfacebook) from Promokit.eu for...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles