Flashpoint is observing that Russian advanced persistent threat (APT) groups are evolving their tactics, techniques, and procedures (TTPs)—while also expanding their targeting. They are using new spear-phishing campaigns to exfiltrate data and credentials by delivering malware sold on illicit marketplaces.
Flashpoint identified the following Russian APT groups have engaged in recent campaigns, listing the malware strains used in attributed attacks and their intended targets:
Threat Group | Malware | Target(s) |
---|---|---|
APT28 | Credomap, Oceanmap, Masepie, Steelhook, Unidentified 114 | Poland, Ukraine |
APT29 | ROOTSAW, WINELOADER, Quarterrig, BURNTBATTER, SPICYBEAT, MUSKYBEAT, STATICNOISE | Germany, Ukraine |
APT44 | Smokeloader, Rhadamanthys | Ukraine, Eastern Europe, Journalists |
Gamaredon | GammaSteel | Ukraine |
Gossamer Bear | Spica | NATO countries, Ukraine |
Storm-097 | RomCom | Europe, North America |
Turla | Capibar, Kazuar | Ukraine |
UAC-0050 | Remcos RAT, MeduzaStealer | Poland, Ukraine |
UAC-0149 | COOKBOX | Ukraine |
Winter Vivern | Aperitif | Poland, Ukraine |
The use of spear-phishing among Russian state-sponsored actors is a noticeable shift from the start of the Ukraine-Russian War that began in 2022. At the start of the conflict, state-sponsored groups had favored the use of destructive wiper malware. However, near the end of 2023, the Ukrainian Computer Emergency Response Team (CERT) began to see a shift in their tactics, responding to over 1,700 phishing attacks, including distributing malware, harvesting credentials, and extortion incidents.
Flashpoint found that the most prevalent malware families used in these spear-phishing campaigns were Agent Tesla, Remcos, Smokeloader, Snake Keylogger, and Guloader. The attack chains used across these groups share malware and techniques for evading detection.
Here’s what you should know about these APTs and their TTPs:
Flashpoint analysts reviewed campaigns by the following Russian groups. Each of these APT groups are currently active in 2024:
The most common method for infecting victims is by delivering HTML-based droppers that are often packaged in compressed archive or disk image files. State-sponsored groups such as APT29 persistently leverage HTML attachments to phishing emails that execute the JavaScript-based dropper ROOTSAW. When the HTML file is executed, the victim is presented with a lure while the malicious code executes. The purpose of this is to retrieve and execute a second-stage payload.
While some campaigns delivered ROOTSAW with HTML file attachments, APT29 also used .HTA files that delivered WINELOADER malware, which is a backdoor delivered via phishing emails. HTA files execute outside of the security constraints of a browser, therefore allowing simple payloads to evade detection. Other APT groups such as Gamaredon also used HTA droppers in their campaigns. This infection chain is also implemented by other cybercrime campaigns that deliver infostealers and other commodity malware.
Russian APT groups develop a variety of backdoors, stealers, and loaders to compromise victims. In a 2023 campaign, APT29 delivered at least six unique loaders in their spear-phishing campaigns. Recently, the group has pivoted toward WINELOADER, a variant of past payloads. When executed, WINELOADER is injected into a legitimate executable via DLL-sideloading. Once loaded, the loader communicates with the C2 over HTTP GET requests.
However, not all APT groups are developing custom payloads. Other groups simply purchase malware from illicit marketplaces. These tools are used by other cybercrime actors. Throughout 2023, the most popular malware leveraged by Russian threat actors had been freely available for purchase. Even advanced espionage actors such as APT44 have conducted campaigns leveraging Sandworm malware since the start of 2023.
Russian threat groups leverage compromised websites for command and control (C2). APT29, Gamaredon, and Gossamer Bear have implemented compromised WordPress sites to impede attribution of their C2 servers.
In February 2024, the US Department of Justice disrupted a botnet of compromised routers that APT28 used for spear-phishing and credential harvesting campaigns.
In a credential-harvesting campaign in late 2023, APT28 leveraged NTLMv2 hash relay attacks. These attacks deliver a PowerShell or VBS script to the victim, which triggers an NTLMv2 authentication over HTTP and creates an HTTP listener to receive the requests.
In another campaign, APT28 leveraged an offensive PowerShell framework, to capture NTLM hashes and exfiltrated data through a free service that allows users to quickly stand up mock application programming interfaces (APIs). In Q3 2023, APT29 used a public API service to obtain a victim’s IP address.
As the Ukraine-Russian War continues, Russian APT groups are continuously adapting their TTPs and malware. Many groups share delivery techniques, indicating possible collaboration between members. In addition, the use of paid tools instead of custom payloads suggests that many of these illegal campaigns have proved to be successful. What does this mean for you?
Given the use of paid tools and similar delivery techniques, organizations can help to protect themselves by:
To defend against threats, organizations must stay vigilant by implementing robust security measures, monitoring for unusual activities, and leveraging advanced threat intelligence solutions. Sign up for a demo today and see how Flashpoint empowers organizations to stay ahead of evolving cyber threats.