Cyber Security

SPECTR Malware Targets Ukraine Defense Forces in SickSync Campaign

Jun 07, 2024NewsroomCyber Attack / Malware

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks targeting defense forces in the country with a malware called SPECTR as part of an espionage campaign dubbed SickSync.

The agency attributed the attacks to a threat actor it tracks under the moniker UAC-0020, which is also called Vermin and is assessed to be associated with security agencies of the Luhansk People’s Republic (LPR). LPR was declared a sovereign state by Russia days prior to its military invasion of Ukraine in February 2022.

Attack chains commence with spear-phishing emails containing a RAR self-extracting archive file containing a decoy PDF file, a trojanized version of the SyncThing application that incorporates the SPECTR payload, and a batch script that activates the infection by launching the executable.

SPECTR serves as an information stealer by grabbing screenshots every 10 seconds, harvesting files, gathering data from removable USB drives, and stealing credentials and from web browsers and applications like Element, Signal, Skype, and Telegram.

Cybersecurity

“At the same time, to upload stolen documents, files, passwords and other information from the computer, the standard synchronization functionality of the legitimate SyncThing software was used, which, among other things, supports the establishment of a peer-to-peer connection between computers,” CERT-UA said.

SickSync marks the return of the Vermin group after a prolonged absence, which was previously observed orchestrating phishing campaigns aimed at state bodies of Ukraine to deploy the SPECTR malware in March 2022. SPECTR is known to have been used by the actor since 2019.

Vermin is also the name assigned to a .NET remote access trojan that has been used to target various Ukrainian government institutions for nearly eight years. It was first publicly reported by Palo Alto Networks Unit 42 in January 2018, with a subsequent analysis from ESET tracing the attacker activity back to October 2015.

The disclosure comes as CERT-UA warned of social engineering attacks leveraging the Signal instant messaging app as a distribution vector to deliver a remote access trojan called DarkCrystal RAT (aka DCRat). They have been linked to an activity cluster codenamed UAC-0200.

“Once again, we note a trend towards an increase in the intensity of cyberattacks using messengers and legitimate compromised accounts,” the agency said. “At the same time, one way or another, the victim is encouraged to open the file on the computer.”

Cybersecurity

It also follows the discovery of a malware campaign conducted by Belarusian state-sponsored hackers known as GhostWriter (aka UAC-0057 and UNC1151) that employs booby-trapped Microsoft Excel documents in attacks aimed at the Ukrainian Ministry of Defense.

“Upon execution of the Excel document, which contains an embedded VBA Macro, it drops an LNK and a DLL loader file,” Broadcom-owned Symantec said. “Subsequently, running the LNK file initiates the DLL loader, potentially leading to a suspected final payload including AgentTesla, Cobalt Strike beacons, and njRAT.”

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

Articles You May Like

Zero-Day Alert: Three Critical Ivanti CSA Vulnerabilities Actively Exploited
Zuckerberg’s metaverse is finally showing signs of life, but it’s not from VR
Tencent, Guillemot Family Said to Consider Buyout of Ubisoft After Market Value Dips
Poco C75 Global Variant May Come With up to 8GB of RAM, 256GB of Storage: Report
Resident Evil 2 Remake Is Coming to iPhone, iPad and Mac in December