🚀💳 Trustee Plus - більше ніж криптогаманець з європейською платіжною карткою. Спробуй 👉

Russian hacker group Gamaredon spreads Remcos RAT Trojan in Ukraine under the guise of military information

The Russian hacking group Gamaredon is carrying out phishing attacks on Ukrainian organizations, using decoys related to troop movements to spread the Remcos RAT remote access trojan.

Leave a comment
Russian hacker group Gamaredon spreads Remcos RAT Trojan in Ukraine under the guise of military information

The Russian hacking group Gamaredon is carrying out phishing attacks on Ukrainian organizations, using decoys related to troop movements to spread the Remcos RAT remote access trojan.

Cisco Talos researchers have discovered that attackers are sending ZIP archives with LNK files disguised as Microsoft Office documents, which when opened run PowerShell scripts to download malware from servers in Russia and Germany.

First, hackers use LNK files containing PowerShell code to download and execute the next stages of the attack. The second stage involves downloading a ZIP archive with a malicious DLL library, which, through the DLL side-loading technique, launches the Remcos RAT, which gives hackers remote access to infected systems.

Names of infected files
3079807576 (Shashylo O.V)/SHASHYLO Oleksandr Vitaliyovych.docx.lnk

3151721177 (Rybak S. V)/RYBAK Stanislav Viktorovych.docx.lnk

3407607951 (Zholob V.V)/ZHOLOB Vladislav Viktorovych.docx.lnk

3710407173 (Gur'ev P.A)/GUR'EV Pavel Andriyovych.docx.lnk

Probable location of communication nodes, EW installations and enemy UAV units. SOUTH OF THE RED ARMY.docx.lnk

GUR'EV Pavlo Andriyovych.docx.lnk

Coordinates of enemy takeoffs in 8 days (Krasnoarmeysk).xlsx.lnk

Enemy positions west and south-west.xlsx.lnk

FISHERMAN Stanislav Viktorovich.docx.lnk

SHASHYLO Oleksandr Vitaliyovych.docx.lnk

The virus distribution campaign consists of four large phishing clusters that impersonate the US Central Intelligence Agency, the Russian Volunteer Corps, the Legion of Freedom, and Hochu Zhit, a hotline for receiving appeals from Russian servicemen in Ukraine requesting to surrender to the Armed Forces of Ukraine.

Attackers use Google Forms and email responses to collect personal information about victims, including their political views, unhealthy habits, and physical fitness.

Gamaredon, also known as UAC-0010 and Armageddon, has been active since at least 2013 and is associated with the Russian Federal Security Service (FSB). The group specializes in cyber espionage and data theft, focusing its attacks primarily on Ukrainian government institutions. Previously, a service called Tryzub was created in Ukraine to simulate the behavior of Armageddon and Sandworm hackers for further study.

Ukraine is constantly suffering from cyberattacks from the enemy, and the case with Ukrzaliznytsia is a good illustration that the enemy is investing considerable resources to undermine the digital infrastructure. We recall that we previously spoke with the Director General of the National Cybersecurity Directorate of Romania about the current state of European cybersecurity.

Read the country's main IT news in our Telegram
Read the country's main IT news in our Telegram
On the topic
Read the country's main IT news in our Telegram
Hackers from the Russian Sandworm group are attacking Ukrainian users who use pirated Windows KMS activators
Hackers from the Russian Sandworm group are attacking Ukrainian users who use pirated Windows KMS activators
On the topic
Hackers from the Russian Sandworm group are attacking Ukrainian users who use pirated Windows KMS activators
Russian hackers Sandworm have already hacked Ukrainian power grids several times. In 2022, they combined the cyberattack with missile strikes
Russian hackers Sandworm have already hacked Ukrainian power grids several times. In 2022, they combined the cyberattack with missile strikes
On the topic
Russian hackers Sandworm have already hacked Ukrainian power grids several times. In 2022, they combined the cyberattack with missile strikes
"Passengers, the train is not moving any further." Is it moving? How hackers have "defaced" railway infrastructure in different countries over the past 10 years: a timeline
"Passengers, the train is not moving any further." Is it moving? How hackers have "defaced" railway infrastructure in different countries over the past 10 years: a timeline
On the topic
"Passengers, the train is not moving any further." Is it moving? How hackers have "defaced" railway infrastructure in different countries over the past 10 years: a timeline
Підключай Megogo зі знижками за акційними тарифами.

від 99 гривень на місяць

Have important news to share? Message our Telegram bot

Key events and useful links in our Telegram channel

Discussion
No comments yet.