• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
trickbot gang shifted its focus on "systematically" targeting ukraine

TrickBot Gang Shifted its Focus on “Systematically” Targeting Ukraine

You are here: Home / General Cyber Security News / TrickBot Gang Shifted its Focus on “Systematically” Targeting Ukraine
July 8, 2022

In what is staying explained as an “unparalleled” twist, the operators of the TrickBot malware have resorted to systematically focusing on Ukraine due to the fact the onset of the war in late February 2022.

The group is believed to have orchestrated at minimum 6 phishing strategies aimed at targets that align with Russian point out pursuits, with the email messages performing as lures for providing malicious software package these types of as IcedID, CobaltStrike, AnchorMail, and Meterpreter.

Tracked under the names ITG23, Gold Blackburn, and Wizard Spider, the financially inspired cybercrime gang is acknowledged for its development of the TrickBot banking trojan and was subsumed into the now-discontinued Conti ransomware cartel earlier this yr.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


But merely months afterwards, the actors linked with the team resurfaced with a revamped version of the AnchorDNS backdoor termed AnchorMail that uses SMTPS and IMAP protocols for command-and-handle communications.

“ITG23’s strategies versus Ukraine are notable due to the extent to which this activity differs from historical precedent and the fact that these campaigns appeared precisely aimed at Ukraine with some payloads that advise a better degree of concentrate on variety,” IBM Security X-Drive analyst Ole Villadsen explained in a specialized report.

A apparent shift in the strategies entails the use of hardly ever-ahead of-noticed Microsoft Excel downloaders and the deployment of CobaltStrike, Meterpreter, and AnchorMail as 1st-phase payloads. The attacks are reported to have commenced in mid-April 2022.

Interestingly, the risk actor leveraged the specter of nuclear war in its email ruse to spread the AnchorMail implant, a tactic that would be repeated by the Russian country-state group tracked as APT28 two months later to distribute information-thieving malware in Ukraine.

What’s more, the Cobalt Strike sample deployed as section of a Might 2022 marketing campaign used a new crypter dubbed Forest to evade detection, the latter of which has also been employed in conjunction with the Bumblebee malware, lending credence to theories that the loader is getting operated by the TrickBot gang.

“Ideological divisions and allegiances have increasingly turn out to be clear in just the Russian-speaking cybercriminal ecosystem this yr,” Villadsen pointed out. “These strategies offer evidence that Ukraine is in the crosshairs of distinguished Russian cybercriminal groups.”

The growth comes as Ukrainian media shops have been targeted with phishing messages that contains malware-laced documents that exploit the Follina vulnerability to fall the DarkCrystal RAT on compromised methods.

CyberSecurity

The Computer system Crisis Response Group of Ukraine (CERT-UA) has also warned of intrusions conducted by a team referred to as UAC-0056 that consists of hanging state businesses with staffing-themed lures to drop Cobalt Strike Beacons on the hosts.

The company, last thirty day period, even more pointed out the use of Royal Road RTF weaponizer by a China-based mostly actor codenamed the Tonto Crew (aka Karma Panda) to target scientific and technological enterprises and condition bodies located in Russia with the Bisonal malware.

Attributing these attacks with medium self confidence to the sophisticated persistent threat (APT) group, SentinelOne claimed the conclusions exhibit “a ongoing effort and hard work” on the element of the Chinese intelligence apparatus to goal a huge vary of Russian-linked organizations.

Observed this report appealing? Adhere to THN on Facebook, Twitter  and LinkedIn to read through more exclusive content we article.


Some pieces of this write-up are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Apple Announces ‘Lockdown Mode’ to Protect Journalists, Human Rights Workers From Spyware
Next Post: The new wave of cyber security threats facing critical national infrastructure (CNI) the new wave of cyber security threats facing critical national»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.