HomeCyber BalkansOperation HollowQuill: Weaponized PDFs Deploy Cobalt Strike Malware in Government and Military...

Operation HollowQuill: Weaponized PDFs Deploy Cobalt Strike Malware in Government and Military Networks

Published on

spot_img

In a recent discovery by SEQRITE Labs, the unveiling of a highly advanced cyber-espionage campaign known as Operation HollowQuill has sent shockwaves through the cybersecurity world. This operation has set its sights on academic, governmental, and defense-related networks in Russia, utilizing weaponized decoy PDFs as a vehicle to deliver Cobalt Strike malware implants.

The primary target of this insidious campaign appears to be critical institutions such as the Baltic State Technical University (BSTU “VOENMEKH”), a significant contributor to Russia’s military-industrial complex. By infiltrating these key establishments, the threat actors behind Operation HollowQuill are seeking to gain access to sensitive information and compromise vital systems.

The technical exploitation chain of this operation starts with a malicious RAR archive containing a .NET-based malware dropper disguised as official research invitations from the Ministry of Science and Higher Education of Russia. This archive includes various components, including a legitimate OneDrive executable, a Golang-based shellcode loader, and a decoy PDF document designed to lure in the target entities.

Once executed, the .NET dropper deploys the shellcode loader, injecting malicious code into the OneDrive process, and presenting the decoy PDF to mask its activities. The shellcode loader utilizes advanced techniques like APC injection to execute the payload stealthily in memory, evading detection.

The decoy PDF used in this operation mimics official communication regarding state-assigned research projects for the upcoming budget cycle, providing detailed guidelines for proposal submissions within Russia’s Unified State Information System for Scientific Research and Technological Projects. The document, signed by high-ranking officials, enhances credibility and increases the chances of user engagement.

The final step in this operation involves deploying a Cobalt Strike beacon, a commonly used penetration testing tool that has been repurposed for malicious intent. The beacon connects to a command-and-control (C2) server hosted on domains like phpsymfony[.]com, using HTTP GET requests with encoded data to communicate covertly with the attacker infrastructure.

Further analysis of the campaign’s infrastructure has revealed operational security oversights by the attackers, such as exposed Go build IDs and rotating C2 domains across multiple ASN services globally. These identifiers have allowed researchers to track similar payloads and malicious binaries distributed through other campaigns.

Operation HollowQuill sheds light on the concerning trend of cyber warfare targeting critical research and defense networks through sophisticated phishing tactics and advanced malware delivery mechanisms. By exploiting legitimate applications like OneDrive and employing in-memory execution techniques, the attackers demonstrate a high level of technical expertise aimed at bypassing detection while compromising crucial systems.

This campaign serves as a stark reminder of the pressing need for robust cybersecurity measures across government and military sectors to mitigate the risks posed by increasingly sophisticated threat actors. As cyber threats continue to evolve and become more complex, organizations must remain vigilant and proactive in defending against such attacks to safeguard their valuable assets and critical infrastructure.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...