The Gamaredon APT group has escalated its spear-phishing campaign, posing a severe threat to Ukrainian military personnel, as unveiled by Cyble Research and Intelligence Labs (CRIL). This sophisticated operation utilizes spear-phishing emails to infiltrate sensitive military systems, underscoring the group’s persistent focus on targeting Ukrainian government entities and critical infrastructure.
Known as Primitive Bear or Armageddon, Gamaredon is a Russian-affiliated Advanced Persistent Threat (APT) group that has been operational since at least 2013, primarily engaging in cyber-espionage activities. Despite the group’s utilization of relatively simplistic tools, its targeted approach towards specific geopolitical interests has resulted in numerous successful cyber-attacks.
The latest phase of the Gamaredon campaign, as dissected by CRIL, signifies an escalation in tactics and reach. The group now employs spear-phishing emails to disseminate malicious payloads aimed at Ukrainian military personnel, showcasing a pattern of coordinated and large-scale cyber assaults.
These spear-phishing emails, centered around military summonses with subjects like “ПОВІСТКА” (“summons” in English), carry malicious XHTML attachments crafted to initiate destructive actions upon opening. Once activated, the XHTML file executes obfuscated JavaScript code, hidden within a div element with an id set to “jwu,” leveraging Base64 encoding and random characters to obscure its true purpose. This obfuscation serves as a deliberate evasion tactic against security systems, allowing the JavaScript code to download a RAR compressed folder silently into the victim’s Downloads directory. The folder disguises itself as a legitimate file, aiming to deceive the user further.
Within the downloaded RAR file lies a Windows shortcut (LNK) file, which, when executed, triggers the launch of a remote .tar archive hosted via TryCloudflare’s one-time tunnel feature. This tactic enables the Gamaredon group to access resources and deploy their malicious payloads without conventional detection methods, showcasing their adaptability and innovation in circumventing cybersecurity measures.
Moreover, the inclusion of a 1-pixel remote image within the malicious files acts as a tracking mechanism, enabling the attackers to monitor interactions with their phishing content and evaluate the effectiveness of their attacks. While CRIL’s investigation could not retrieve the contents of the .tar files, insights from other cybersecurity experts suggest the likelihood of these archives containing further malicious payloads designed to exfiltrate sensitive information from compromised systems.
To combat sophisticated spear-phishing attacks like those orchestrated by Gamaredon, organizations, particularly in sensitive sectors like the military, must implement robust cybersecurity strategies. User training plays a pivotal role in enhancing awareness and recognizing spear-phishing attempts, especially those involving military-themed attachments or messages. Advanced email security solutions with threat protection capabilities, coupled with anti-malware tools capable of detecting obfuscated JavaScript code and malicious LNK files, are imperative.
Additionally, network monitoring, application whitelisting, and leveraging threat intelligence platforms to block known malicious domains are essential measures to bolster defenses against cyber threats. The ongoing Gamaredon campaign underscores the critical importance of proactive and vigilant cybersecurity measures to safeguard against escalating cyber threats targeting Ukrainian military personnel.通过使用 spear-phishing 电子邮件、恶意 XHTML 附件和 TryCloudflare 的一次性隧道功能等高级逃避技术,Gamaredon 继续完善和加剧了其攻击。该攻击活动的坚持和规模突显了维护警惕和积极采取网络安全措施的重要性。

