A previously unknown threat actor has been observed copying the tradecraft associated with the Kremlin-aligned Gamaredon hacking group in its cyber attacks targeting Russian-speaking entities. The group, dubbed GamaCopy, has been launching sophisticated cyber espionage campaigns that mimic the tactics of the notorious Gamaredon group.
Researchers from Knownsec 404 Advanced Threat Intelligence team have uncovered a series of attacks that leverage content related to military facilities as lures to drop UltraVNC, a remote access tool that enables threat actors to gain unauthorized access to compromised systems. The attack chain demonstrates a complex methodology designed to evade detection and blend in with legitimate network traffic.
The campaign involves using self-extracting (SFX) 7-Zip archive files to deliver payloads, a technique commonly associated with Gamaredon's previous operations. In these attacks, the threat actors carefully craft batch scripts and use obfuscation techniques like EnableDelayedExpansion to make static analysis more challenging.
Interestingly, the UltraVNC executable is renamed to "OneDrivers.exe" in an attempt to disguise its true nature and reduce suspicion. The attackers connect to command and control servers using port 443, further camouflaging their malicious activities within what appears to be standard HTTPS traffic.
While the attacks bear significant similarities to Gamaredon's tactics, researchers note key differences. Unlike Gamaredon, which primarily uses Ukrainian-language lures, GamaCopy predominantly employs Russian-language documents. This distinction suggests the group may have different operational motivations.
The emergence of GamaCopy comes in the context of ongoing geopolitical tensions, with multiple threat actors targeting Russian organizations in the wake of the Russo-Ukrainian conflict. The group appears to be part of a broader landscape of cyber threat actors seeking to exploit the complex digital battleground.
Security experts believe GamaCopy has been active since at least August 2021, with its campaigns primarily focused on Russia's defense and critical infrastructure sectors. The group's ability to convincingly mimic another threat actor's tactics highlights the increasingly sophisticated nature of cyber espionage operations.
Organizations are advised to remain vigilant, implement robust endpoint detection mechanisms, and maintain up-to-date security protocols to protect against such advanced persistent threats.
Found this article interesting? Keep visit thesecmaster.com, and our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium, and Instagram and subscribe to receive tips like this.
You may also like these articles: Here are the 5 most contextually relevant blog posts:
Horns&Hooves New Malware Campaign Targets Russian Businesses
Russian Gamaredon APT Deploys New Android Spyware Targeting Former Soviet States
North Korean Hackers Deploy New OtterCookie Malware Targeting Software Developers
Russian APT Earth Koshchei Exploits Red Team Tools in Massive RDP Campaign
Russian Hackers Target Kazakhstan Diplomatic Files in Strategic Cyber Espionage Campaign
Anthony Denis a Security News Reporter with a Bachelor's in Business Computer Application. Drawing from a decade of digital media marketing experience and two years of freelance writing, he brings technical expertise to cybersecurity journalism. His background in IT, content creation, and social media management enables him to deliver complex security topics with clarity and insight.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.