Russian hackers target German political parties with WineLoader malware

  • March 22, 2024
  •  
  • 03:27 PM
  •  
  • 1

Russian hacker

Researchers are warning that a notorious hacking group linked to Russia's Foreign Intelligence Service (SVR) is targeting political parties in Germany for the first time, shifting their focus away from the typical targeting of diplomatic missions.

The phishing attacks are designed to deploy a backdoor malware named WineLoader, which allows threat actors to gain remote access to compromised devices and networks.

APT29 (also known as Midnight Blizzard, NOBELIUM, Cozy Bear) is a Russian espionage hacking group believed to be part of the Russian Foreign Intelligence Service (SVR)

The hacking group has been linked to many cyberattacks, including the infamous SolarWinds supply chain attack in December 2020.

The threat actors have remained active throughout these years, typically targeting governmentsembassiessenior officials, and various entities using a range of phishing tactics or supply chain compromises.

APT29's recent focus has been on cloud services, breaching Microsoft systems and stealing data from Exchange accounts, and compromising the MS Office 365 email environment used by Hewlett Packard Enterprise.

Impersonating political parties

Mandiant researchers say that APT29 has been conducting a phishing campaign against German political parties since late February 2024. This marks a significant shift in the hacking group's operational focus, as it's the first time the hacking group has targeted political parties.

The hackers now use phishing emails with a lure themed around the Christian Democratic Union (CDU), a major political party in Germany and currently the second largest in the federal parliament (Bundestag).

The phishing emails seen by Mandiant pretend to be dinner invitations by the CDU that embed a link to an external page that drops a ZIP archive containing the 'Rootsaw' malware dropper.

Phishing message
Phishing message (Mandiant)

When executed, the Rootsaw malware downloads and executes a backdoor named 'WineLoader' on the victim's computer.

The WineLoader malware was previously discovered by Zscaler in February, who saw it deployed in phishing attacks pretending to be invites to diplomats for a wine-tasting event.

The WineLoader backdoor features several similarities with other malware variants deployed in past APT29 attacks, such as 'burnbatter', 'myskybeat', and 'beatdrop,' suggesting a common developer.

However, the malware is modular and more customized than previous variants, does not use off-the-shelf loaders, and establishes an encrypted communication channel for data exchange with the command and control (C2) server.

Mandiant's analysts first saw WineLoader in late January 2024 in an operation targeting the Czech Republic, Germany, India, Italy, Latvia, and Peru diplomats. Thus, the particular variant appears to have been the malware of choice for APT29 lately.

To evade detection, WineLoader is decrypted using RC4 and loaded directly into memory via DLL side-loading, abusing a legitimate Windows executable (sqldumper.exe).

Wineloader sends the victim's username, device name, process name, and other information to the C2 to help profile the system.

The C2 can order the execution of modules that can be dynamically loaded to perform specific tasks, such as establishing persistence.

Though Mandiant does not delve into any modules, it is assumed that WineLoader's modular nature allows it to execute a wide range of espionage activities in line with APT29's mission.

APT29 continues demonstrating its advanced technical proficiency and ongoing efforts to develop tools to infiltrate and spy on targeted entities.

The shift to political parties suggests an intent to influence or monitor political processes, possibly reflecting broader geopolitical objectives.

 
Αναζήτηση
Κατηγορίες
Διαβάζω περισσότερα
Ransomware gang claims they stole 6TB of Change Healthcare data
February 28, 2024   02:33 PM   0 Image: Midjourney The...
από AFFA 2024-02-29 18:52:01 0 100
Microsoft warns Gmail blocks some Outlook email as spam, shares fix
April 2, 2024   06:09 PM   2 Microsoft has confirmed that some...
από AFFA 2024-04-03 17:55:45 0 57
Critical Fortinet flaw may impact 150,000 exposed devices
March 8, 2024   03:37 PM   0 Scans on the public web show that...
από AFFA 2024-03-09 21:25:11 0 101
New AcidPour data wiper targets Linux x86 network devices
March 19, 2024   10:33 AM   0 A new destructive malware named...
από AFFA 2024-03-19 15:22:09 0 142
Microsoft confirms Windows 12 is not happening this year
Windows About Settings confirm "version 24H2", not Windows 12. Microsoft has officially...
από AFFA 2024-02-17 17:22:18 0 144