Shuckworm, a Russia-linked espionage group, continues to target Ukraine, focusing on military missions of Western countries. Utilizing an updated GammaSteel tool, the group has shifted from VBS scripts to PowerShell-based methods and employs various ransom exfiltration techniques, including leveraging legitimate web services. The campaign demonstrates increased sophistication in data exfiltration methods and obfuscation strategies. Affected: Ukraine, Western military missions
Keypoints :
- Shuckworm has continued its focus on Ukraine into 2025, targeting military operations.
- The initial infection vector was an infected removable drive.
- GammaSteel, an updated infostealer tool, is being used for data exfiltration.
- The group employs methods like cURL and Tor for obfuscation and data transfer.
- Thereβs a noticeable shift from VBS scripts to PowerShell tools.
- The campaign includes advanced obfuscation techniques to minimize detection risks.
- Shuckworm operates on behalf of the Russian Federal Security Service (FSB).
- The attack chain involves multi-staged infection methods and registry modifications.
- Exfiltrated information includes usernames, disk serial numbers, and environment details.
- Attackers utilize legitimate services to disguise their command and control (C&C) communications.
MITRE Techniques :
- T1068: Exploitation of Privilege Vulnerabilities – Utilization of system vulnerabilities via obfuscated PowerShell commands.
- T1071.001: Application Layer Protocol: Web Protocols – Data exfiltration through web services like cURL and write.as.
- T1041: Exfiltration Over Command and Control Channel – Use of HTTP(S) methods to transmit exfiltrated data.
- T1059.001: Command and Scripting Interpreter: PowerShell – Execution of PowerShell scripts for reconnaissance and exfiltration.
- T1070: Indicator Removal on Host – Modification of registry keys to hide malicious files and processes.
- T1027: Obfuscated Files or Information – Deployment of heavily obfuscated scripts to evade detection.
Indicator of Compromise :
- [URL] hxxps://write.as/api/posts
- [IP Address] 107.189.19.218
- [IP Address] 3.73.33.225
- [Domain] nav-ni-furnished-handy.trycloudflare[.]com
- [Domain] areas-apps-civic-loving.trycloudflare[.]com
Full Story: https://symantec-enterprise-blogs.security.com/threat-intelligence/shuckworm-ukraine-gammasteel
Views: 25