Russian Shuckworm

Russians hit again: Shuckworm espionage group targeting Ukraine

2 Mins Read

PUREVPNNewsRussians hit again: Shuckworm espionage group targeting Ukraine

The Russian threat group known as Shuckworm has been actively carrying out cyber attacks on Ukrainian organizations to steal sensitive information. 

According to a recent report from Symantec, their targets have included security services, military institutions, and government entities. These cyber intrusions commenced between February and March of 2023 and have persisted for several months in certain instances.

Who is Shuckworm?

Shuckworm, also recognised under various aliases such as Aqua Blizzard, Armageddon, Gamaredon, and UNC530, is believed to have ties to Russia’s Federal Security Service (FSB). This group has been operational since at least 2013. Their primary tactics revolve around spear-phishing campaigns, where they:

  • Send carefully crafted emails to victims, luring them into opening malicious attachments
  • These attachments deploy information-stealing malware like Giddome, Pterodo, GammaLoad, and GammaSteel onto the compromised systems.

Secureworks, a cybersecurity company, characterizes Shuckworm as “operating quickly, prioritizing speed over operational security. This approach has made their infrastructure easily identifiable due to their consistent use of specific Dynamic DNS providers, Russian hosting services, and remote template injection techniques.”

Tactics it follows

In their recent attacks, Shuckworm has been observed 

  • Utilizing a fresh PowerShell script to propagate the Pterodo backdoor through USB drives. 
  • While it is known that the group employs Telegram channels to retrieve IP addresses of servers hosting their malicious payloads.
  • They have expanded their techniques by storing command-and-control (C2) addresses on Telegraph, a blogging platform owned by Telegram. Another tool employed by these hackers is a PowerShell script named “foto.safe,” which is distributed through compromised USB drivers and has the capability to download additional malware onto the infected machines.

Source: Symantec

  • Further analysis of these intrusions has revealed that Shuckworm successfully breached the systems of human resources departments within the targeted organizations. This suggests their objective is to gather information about the individuals these entities employ.

These findings illustrate the Shuckworm’s continued reliance on ephemeral infrastructure and their ongoing adaptation of tactics and tools to evade detection. 

Thoughts in hand

Russia’s nation-based attacks are a clear indicator that they are targeting Ukraine as a whole. Targeting high-profile areas in any country makes it clear that the purpose is to know the secrets of survival. Whatever the motives are! War must end and should never happen again.

author

PureVPN

date

June 16, 2023

time

11 months ago

PureVPN is a leading VPN service provider that excels in providing easy solutions for online privacy and security. With 6000+ servers in 65+ countries, It helps consumers and businesses in keeping their online identity secured.

Have Your Say!!

Join 3 million+ users to embrace internet freedom

Signup for PureVPN to get complete online security and privacy with a hidden IP address and encrypted internet traffic.