• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
phishing campaign targeted those aiding ukraine refugees

Phishing Campaign Targeted Those Aiding Ukraine Refugees

You are here: Home / Latest Cyber Security Vulnerabilities / Phishing Campaign Targeted Those Aiding Ukraine Refugees
March 3, 2022

A armed forces email handle was applied to distribute malicious email macros amongst EU staff aiding Ukrainians.

Cyberattackers utilized a compromised Ukrainian military services email deal with to phish EU government workers who’ve been included in managing the logistics of refugees fleeing Ukraine, according to a new report.

Ukraine has been at the middle of an unprecedented wave of cyberattacks in the latest weeks and months, from distributed denial-of-service (DDoS) strategies in opposition to corporations and citizens to attacks against countrywide infrastructure and more. This time, attackers went right after aides in the EU, leveraging breaking news in the Russian invasion of Ukraine to entice targets into opening e-mail made up of Microsoft Excel documents laced with malware.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Researchers attributed the phishing endeavor to TA445 (aka UNC1151 or Ghostwriter). TA445 has earlier been joined with the authorities of Belarus.

Attack Coincided with Russia’s Invasion

On Wednesday, Feb. 23, NATO convened an emergency conference regarding the impending Russian invasion of Ukraine.

The next working day – the day Russia invaded Ukraine – researchers detected a suspicious email building the rounds. Its issue: “IN ACCORDANCE WITH THE Selection OF THE Unexpected emergency Conference OF THE SECURITY COUNCIL OF UKRAINE DATED 24.02.2022.” It contained a macros-enabled Microsoft Excel (.xls) spreadsheet titled “list of people.xlsx” that, when opened, delivered malware called SunSeed.

The email originated from a ukr.net tackle, which is a Ukrainian military email deal with. Oddly ample, the researchers have been capable to trace the tackle to a publicly available procurement document for a Stihl-brand lawn mower, bought back in 2016. The buy was produced by “Військова частина А2622,” a armed service unit centered in Chernihiv, Ukraine. Accurately how the attackers received entry to a military email address is not obvious.

This phishing qualified a quite certain team of European federal government personnel concerned in controlling the outflux of refugees from Ukraine. Nevertheless the targets “possessed a assortment of abilities and professional tasks,” the report noted, “there was a distinct choice for targeting folks with responsibilities relevant to transportation, monetary and price range allocation, administration, and inhabitants motion inside Europe.”

The purpose in targeting these distinct individuals was “to acquire intelligence concerning the logistics encompassing the motion of cash, materials, and men and women within NATO member nations around the world,” in accordance to the report.

Attackers Tied to Belarus, Russia by Extension

The report mentioned that no “concrete” proof can “definitively” tie this marketing campaign to a particular risk actor. Still, the scientists pointed out a bevy of similarities amongst this phishing campaign and another marketing campaign from July of past 12 months that focused U.S. cybersecurity and defense corporations.

The July marketing campaign “utilized a hugely similar macro-laden XLS attachment to provide MSI offers that set up a Lua malware script,” according to Proofpoint scientists. Lua is the programming language in which SunSeed is coded. “Similarly, the marketing campaign utilized a extremely the latest federal government report as the basis of the social engineering content material,” they extra.

The file name in that marketing campaign – “list of participants of the briefing.xls.” – bears striking resemblance to the a single applied in this new campaign. Moreover, “the Lua script established a nearly identical URI beacon to the SunSeed sample, which was composed of the contaminated victim’s C Generate partition serial number. Evaluation of the cryptography phone calls in the two samples disclosed that the exact same edition of WiX 3.11..1528 experienced been used to develop the MSI packages.”

These overlaps permitted the researchers to conclude with moderate confidence that the two strategies ended up perpetrated by the exact same risk actor: TA445. In accordance to Mandiant, the team is centered in Minsk, connected to the Belarusian army, and conducts its small business in the interests of the Belarusian governing administration. Belarus is a close ally of Russia.

The researchers concluded with a disclaimer. On balancing “responsible reporting with the quickest doable disclosure of actionable intelligence,” they wrote, “the onset of hybrid conflict, which includes inside of the cyber area, has accelerated the rate of functions and decreased the quantity of time that defenders have to remedy further inquiries around attribution and historic correlation to regarded country-condition operators.”

Ukraine’s Unprecedented Cyber Concentrating on

This phishing campaign is not the worst Ukraine-oriented cyberattack in latest months, or even current times. Nonetheless, the researchers pointed out that “while the used tactics in this campaign are not groundbreaking separately, if deployed collectively, and during a superior tempo conflict, they possess the capacity to be really effective.”

Thomas Stoesser, of comforte AG, informed Threatpost via email that this attack “shows just how ruthless and intelligent menace actors can be in adapting current social engineering tactics.”

“The situation underscores two essential factors that each enterprise should heed,” he included. “One, it’s not ample just to educate workers sporadically about widespread social engineering methods. [Companies] want to put a premium on workforce dealing with every email with healthful skepticism. Two, safeguard all sensitive organization information with a lot more than just perimeter security, even if you truly feel that the impenetrable vault you have stored it all in is foolproof.”

Sign up Today for Log4j Exploit: Lessons Acquired and Risk Reduction Most effective Tactics – a Live Threatpost party sked for Thurs., March 10 at 2PM ET. Join Sonatype code qualified Justin Youthful as he assists you sharpen code-looking techniques to reduce attacker dwell time. Master why Log4j is however hazardous and how SBOMs suit into computer software offer-chain security. Sign up Now for this 1-time Cost-free event, Sponsored by Sonatype.


Some elements of this posting are sourced from:
threatpost.com

Previous Post: «russia leaks data from a thousand cuts–podcast Russia Leaks Data From a Thousand Cuts–Podcast
Next Post: Most Disclosed ICS Vulnerabilities are Low Complexity Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.