#ESETresearch has conducted a comprehensive technical analysis of new malicious tools and significant updates observed in 2024 in the arsenal of the Russia-aligned #Gamaredon #APTgroup targeting Ukraine🇺🇦. https://www.welivesecurity.com/en/eset-research/gamaredon-2024-cranking-out-spearphishing-campaigns-ukraine-evolved-toolset/
In 2024, #Gamaredon returned to exclusively targeting Ukrainian governmental institutions, significantly increasing the size and frequency of its #spearphishing campaigns compared to previous years, as shown in the chart.
Besides spearphishing, #Gamaredon continues to use custom malware for lateral movement, weaponizing USB and now also network drives via updated versions of PteroLNK. Additionally, the new tool PteroTickle weaponizes Python apps converted to executables.
The VBScript version of PteroLNK has become the group’s most frequently updated tool. It now weaponizes network drives, hides targeted folders, and creates malicious LNK files using JavaScript executed by mshta.exe.
Gamaredon added stealthier methods to known tools. For example, PteroPSDoor now uses WMI event subscriptions and FileSystemWatcher to quietly monitor files, reducing noisy operations that could alert defenders.
The new tool PteroGraphin implements uncommon persistence via Excel add-ins, creating a hidden channel for payload delivery through Telegraph. Later, Gamaredon simplified its persistence, relying instead on scheduled tasks alone.
Another notable addition is PteroBox, a new PowerShell-based file stealer that exfiltrates files to Dropbox. It prioritizes sensitive documents, tracks exfiltrated files via MD5 hashes, and monitors USB insertions through WMI events
In 2024, Gamaredon went to great lengths to bypass network-based blocking. It increasingly hid its C&C servers behind Cloudflare tunnels and leveraged third-party DNS services, Codeberg repositories, and Telegraph posts to evade detection.
Our detailed technical analysis of the latest Gamaredon tools and techniques is available in the white paper: https://web-assets.esetstatic.com/wls/en/papers/white-papers/gamaredon-in-2024.pdf
IoCs are provided in the white paper and at https://github.com/eset/
Famous Sparrow APT Group: Enhanced Cyber Arsenal and Global Threats

Explore the enhanced cyber arsenal of the Famous Sparrow APT group and their global threat impact.

The DefendOps Diaries

#Microsoft Warns of Chinese Hackers Spying on #Cloud Technology

https://www.msn.com/en-us/money/other/microsoft-warns-of-chinese-hackers-spying-on-cloud-technology/ar-AA1AiU3C

Dublin #srecon2024 #sreconemea24 #srecon24

Private communication with some Azure #sre :

We have #aptgroup s 💀😈in our cloud ☁️
but they are under control👀?

Me: #wtf really 😱

#38c3 cloud #IAM Identity and Access Management has been outsourced to #China https://media.ccc.de/v/38c3-from-simulation-to-tenant-takeover

You don't need to break into a house when you get the key from the owner.

MSN

⚠️ Windows MSHTML zero-day vulnerability under active attack! 🔓 Hackers can exploit this flaw via malicious documents. Apply mitigations ASAP! #Windows #APTGroup #ZeroDay https://www.netsec.news/windows-mshtml-platform-zero-day-vulnerability-actively-exploited-by-apt-group/
Windows MSHTML Platform Zero Day Vulnerability Actively Exploited by APT Group - NetSec.News

Microsoft patched a vulnerability on September Patch Tuesday yet attackers are still exploiting the vulnerability to install data-stealing malware. Vulnerability CVE-2024-43461 is identified as a ... Read more

NetSec.News
Serious Exchange Flaw Still Plagues 350K Servers - The Microsoft Exchange vulnerability was patched in February and has been targeted by several thre... more: https://threatpost.com/serious-exchange-flaw-still-plagues-350k-servers/154548/ #advancedpersistentthreat #microsoftexchange #vulnerabilities #microsoftpatch #microsoftflaw #patchtuesday #microsoft #aptgroup #hacks #patch #apt
Serious Exchange Flaw Still Plagues 350K Servers

The Microsoft Exchange vulnerability was patched in February and has been targeted by several threat groups.

Threatpost - English - Global - threatpost.com
Microsoft Exchange Server Flaw Exploited in APT Attacks - A vulnerability is Microsoft Exchange servers is being actively exploited by multiple APT groups, ... more: https://threatpost.com/microsoft-exchange-server-flaw-exploited-in-apt-attacks/153527/ #advancedpersistentthreat #microsoftexchange #microsoftpatch #microsoftflaw #patchtuesday #microsoft #aptgroup #hacks #patch #apt
Microsoft Exchange Server Flaw Exploited in APT Attacks

A vulnerability is Microsoft Exchange servers is being actively exploited by multiple APT groups, researchers warn.

Threatpost - English - Global - threatpost.com