Russian hackers have launched cyber attacks against Ukrainian government bodies

The Computer Emergency Response Team of Ukraine (CERT-UA) has issued a warning about a recent series of cyberattacks on various government entities in the country. The phishing campaign has been attributed to APT28, also known as Fancy Bear, which is a known associate of the Russian military intelligence agency, GRU.

The attackers are using fake Microsoft Outlook email accounts, created with the employees’ real names and initials, to impersonate system administrators of the targeted government entities. The email messages come with the subject line “Windows Update” and pretend to contain instructions in the Ukrainian language for running a PowerShell command under the pretext of security updates.

Once the script is activated, it loads and executes a new PowerShell script. The second script is designed to collect basic system information and exfiltrate the details via an HTTP request to a Mocky API. This systematic and sophisticated approach to cyber attacks is causing great concern among Ukrainian officials.

Previous ties to APT28

Three weeks before the CERT-UA warning, APT28 was linked to a series of attacks that exploited now-patched security flaws in networking equipment to carry out reconnaissance and deploy malware against specific targets. It comes as no surprise that they are now linked to this new highly targeted phishing campaign.

Exploiting the flaw in Microsoft Outlook

The Russian-based hacking crew has also been linked to the exploitation of a critical privilege escalation flaw in Microsoft Outlook (CVE-2023-23397, CVSS score: 9.8) in intrusions directed against the Ukrainian government, transportation, energy, and military sectors, among others, in Europe. The vulnerability allows an attacker to gain administrative privileges on the target’s system, giving them free rein to move laterally across the network.

Uncovering Multi-Stage Phishing Attack

Fortinet FortiGuard Labs has discovered a multi-stage phishing attack that uses a macro-laced Word document, seemingly from Ukraine’s Energoatom, to trick victims and then deliver the open-source Havoc post-exploitation framework. The framework is created to run arbitrary code and payloads, perform system commands, and upload or download files.

Established Relationship Between Russian Cybercriminal Threat Actors and Cybercriminal Organizations

There are growing concerns that Russian cybercriminal threat actors are now maintaining an established and systematic relationship with cybercriminal organizations, either through indirect collaboration or recruitment. It is unclear if there is any direct link between these groups, but the fact that they continue to operate with such impunity and success is worrying.

Safeguarding against cyber attacks

To safeguard against such highly sophisticated attacks, CERT-UA is recommending that organizations restrict users’ ability to run PowerShell scripts and monitor network connections to the Mocky API. It is also recommending that organizations be cautious when receiving emails from unknown senders and avoid clicking on links or downloading attachments unless they are sure the email is from a trusted source.

With the current cyber threat landscape and the increasing sophistication of cyber-attacks, organizations around the world need to be aware of the risks and threat actors out there. The latest campaign by APT28 targeting Ukrainian government entities highlights the need for heightened cybersecurity measures, and organizations need to take note of these recommendations to secure their operations against such malicious attacks.

Explore more

How Does D365 Revolutionize Telecom Procurement Efficiency?

Dominic Jainy, an IT professional renowned for his expertise in artificial intelligence, machine learning, and blockchain, explores the intersection of technology and industry-specific challenges. Today, we focus on his insights into optimizing procurement within the telecommunications sector using Microsoft Dynamics 365 Finance and Supply Chain Management (D365 F&SCM). Dominic delves into the impact of procurement on service uptime, the intricacies

Traditional ERP Systems vs. Microsoft Dynamics 365: A Comparative Analysis

In today’s fast-paced business environment, choosing the right Enterprise Resource Planning (ERP) system can significantly impact a company’s efficiency and growth trajectory. Traditional ERP systems have long been the backbone of organizational operations, yet modern alternatives like Microsoft Dynamics 365 are reshaping the landscape. This article delves into the advantages and disadvantages of traditional ERP systems versus Microsoft Dynamics 365,

How Does Insight Works Drive Global Expansion with Tech Partners?

In the dynamic landscape of business operations technology, Insight Works is setting a new benchmark by significantly expanding its global footprint through its strategic partnership expansion. By integrating 15 new Microsoft Partners specializing in manufacturing and distribution apps tailored for Microsoft Dynamics 365 Business Central, Insight Works enhances support and optimizes business solutions across key global regions. This initiative highlights

Manufacturing Costing in Dynamics 365 – Review

In the ever-evolving landscape of manufacturing, executing precise inventory evaluation is crucial to determining a business’s success. With the launch of Dynamics 365 Business Central, Microsoft has introduced a pivotal change in how manufacturers address costing complexities. This technology is not just enhancing efficiency, but also reshaping the broader enterprise resource planning (ERP) framework. The focus of this analysis is

How Can Brands Transform User Content Into Marketing Gold?

In a world where customers’ voices echo across digital platforms, brands continuously search for ways to harness these conversations to their advantage. Imagine this: a seemingly ordinary post by a customer goes viral, driving sales, enhancing brand image, and building trust. This scenario is no longer mere fiction as User-Generated Content (UGC) reshapes marketing strategies, proving its unparalleled power in