HomeCyber AttacksHacktivists Exploits WinRAR Vulnerability in Attacks Towards Russia and Belarus

Hacktivists Exploits WinRAR Vulnerability in Attacks Towards Russia and Belarus

A hacktivist group generally known as Head Mare has been linked to cyber assaults that completely goal organizations situated in Russia and Belarus.

“Head Mare makes use of extra up-to-date strategies for acquiring preliminary entry,” Kaspersky stated in a Monday evaluation of the group’s ways and instruments.

“As an example, the attackers took benefit of the comparatively latest CVE-2023-38831 vulnerability in WinRAR, which permits the attacker to execute arbitrary code on the system through a specifically ready archive. This method permits the group to ship and disguise the malicious payload extra successfully.”

Cybersecurity

Head Mare, lively since 2023, is among the hacktivist teams attacking Russian organizations within the context of the Russo-Ukrainian battle that started a yr earlier than.

It additionally maintains a presence on X, the place it has leaked delicate data and inside documentation from victims. Targets of the group’s assaults embody governments, transportation, vitality, manufacturing, and atmosphere sectors.

In contrast to different hacktivist personas that probably function with an goal to inflict “most harm” to corporations within the two international locations, Head Mare additionally encrypts victims’ gadgets utilizing LockBit for Home windows and Babuk for Linux (ESXi), and calls for a ransom for information decryption.

See also  China's MIIT Introduces Colour-Coded Motion Plan for Data Safety Incidents

Additionally a part of its toolkit are PhantomDL and PhantomCore, the previous of which is a Go-based backdoor that is able to delivering extra payloads and importing recordsdata of curiosity to a command-and-control (C2) server.

PhantomCore (aka PhantomRAT), a predecessor to PhantomDL, is a distant entry trojan with comparable options, permitting for downloading recordsdata from the C2 server, importing recordsdata from a compromised host to the C2 server, in addition to executing instructions within the cmd.exe command line interpreter.

“The attackers create scheduled duties and registry values named MicrosoftUpdateCore and MicrosoftUpdateCoree to disguise their exercise as duties associated to Microsoft software program,” Kaspersky stated.

“We additionally discovered that some LockBit samples utilized by the group had the next names: OneDrive.exe [and] VLC.exe. These samples have been situated within the C:ProgramData listing, disguising themselves as authentic OneDrive and VLC purposes.”

Each the artifacts have been discovered to be distributed through phishing campaigns within the type of enterprise paperwork with double extensions (e.g., решение №201-5_10вэ_001-24 к пив экран-сои-2.pdf.exe or тз на разработку.pdf.exe).

See also  China-Linked Bronze Starlight Group Concentrating on Playing Sector with Cobalt Strike Beacons
Cybersecurity

One other essential element of its assault arsenal is Sliver, an open-source C2 framework, and a group of varied publicly obtainable instruments comparable to rsockstun, ngrok, and Mimikatz that facilitate discovery, lateral motion, and credential harvesting.

The intrusions culminate within the deployment of both LockBit or Babuk relying on the goal atmosphere, adopted by dropping a ransom word that calls for a cost in change for a decryptor to unlock the recordsdata.

“The ways, strategies, procedures, and instruments utilized by the Head Mare group are usually much like these of different teams related to clusters concentrating on organizations in Russia and Belarus throughout the context of the Russo-Ukrainian battle,” the Russian cybersecurity vendor stated.

“Nonetheless, the group distinguishes itself by utilizing custom-made malware comparable to PhantomDL and PhantomCore, in addition to exploiting a comparatively new vulnerability, CVE-2023-38831, to infiltrate the infrastructure of their victims in phishing campaigns.”

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular