Friday, October 11, 2024
Homecyber securityRussian based APT Groups Conduct Phishing Campaigns Targeting Ukraine

Russian based APT Groups Conduct Phishing Campaigns Targeting Ukraine

Published on

Malware protection

Google’s Threat Analysis Group (TAG) have been sending warnings to Ukraine and its government about hackers from Russia. In a span of 1 year, TAG has issued several warnings about government-backed hackers targeting Ukrainian users.

In the last two weeks, TAG saw an increased activity from threat actors that they have been regularly watching for over a period of time. Threat actors such as FancyBear and Ghostwriter were very well known by law enforcement agencies. Their attacks range from espionage to phishing campaigns.

FancyBear/APT28 

This hacker group is based upon Russia that have made several phishing campaigns with their primary target as UkrNet (ukr(.)net), an Ukrainian Media company. Most of the campaigns were done through compromised email accounts that send a domain link which is controlled by the attackers. No accounts were from gmail or google, TAG added.

- Advertisement - SIEM as a Service

Blogspot domains were used for their recent campaigns. The blogspot domain contains the initial landing page which then redirects to a phishing page for stealing credentials. TAG has taken down most of the blogspot domains controlled by the attacker.

Phishing pages that were observed are listed below

  • id-unconfirmeduser[.]frge[.]io
  • hatdfg-rhgreh684[.]frge[.]io
  • ua-consumerpanel[.]frge[.]io
  • consumerspanel[.]frge[.]io

Ghostwriter/UNC1151

The hacker group based out of Belarus conducted phishing campaigns targeting Polish and Ukrainian Government and Military organizations during the past week. TAG reported that they also noticed campaigns targeting webmail users from the following webmail providers.

Phishing domains for Ghostwriter campaigns were

  • accounts[.]secure-ua[.]website
  • i[.]ua-passport[.]top
  • login[.]creditals-email[.]space
  • post[.]mil-gov[.]space
  • verify[.]rambler-profile[.]site

Mustang Panda or Temp.Hex 

This threat actor is based out of China has targeting many European entities. The email campaigns will consist of information about Ukrainian Invasion along with a .zip file like “Situation at the EU border with Ukraine.zip”. This zip contains the executable.

It is a boot loader which when executed will download many files along with the final malware payload. These threat actors usually target Southeast Asian targets but it seems like they have shifted to European organizations.

DDoS Attacks

The Ukraine sites such Ukrainian Ministry of Foreign affairs, Internal affairs and many services like Liveumap were observed to have attempted DDoS campaigns. TAG also posted their “Project Shield” which will provide free protection against DDoS attacks which will help Ukrainian government and other worldwide government agencies to defend DDoS attacks.

TAG also posted that, “We’ll continue to take action, identify bad actors and share relevant information with others across industry and governments, with the goal of bringing awareness to these issues, protecting users and preventing future attacks. And while we are actively monitoring activity related to Ukraine and Russia, we continue to be just as vigilant in relation to other threat actors globally, to ensure that they do not take advantage of everyone’s focus on this region.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication...

Mozilla Warns Of Firefox Zero-Day Actively Exploited In Cyber Attacks

A critical use-after-free vulnerability affecting Firefox and Firefox Extended Support Release (ESR) is being...

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution

IDLink, SpyCloud’s new automated digital identity correlation capability, is now core to its industry-leading...

Abusix and Red Sift Form New Partnership, Leveraging Automation to Mitigate Cyber Attacks

The agreement has marked over 600,000 fraudulent domains for takedown in just two months...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication...

Mozilla Warns Of Firefox Zero-Day Actively Exploited In Cyber Attacks

A critical use-after-free vulnerability affecting Firefox and Firefox Extended Support Release (ESR) is being...

Hackers Exploiting Zero-day Flaw in Qualcomm Chips to Attack Android Users

Hackers exploit a zero-day vulnerability found in Qualcomm chipsets, potentially affecting millions worldwide.The flaw,...