Keypoints
- Turla (aka Uroburos, Snake, Venomous Bear) is the threat actor behind the phishing-based reconnaissance campaign described.
- The targets include the Baltic Defense College (BALTDEFCOL) and the Austrian Federal Economic Chamber (WKO), with implications for defense and economic sanction decision-making in Europe.
- Infrastructure components exposed by SEKOIA.IO include several domains and associated IPs used in the operation, such as baltdefcol.webredirect.org, wkoinfo.webredirect.org, and jadlactnato.webredirect.org.
- The campaign uses a Word document with a remote file inclusion pattern that references an external PNG (logo.png), suggesting reconnaissance rather than laden malware delivery.
- The HTTP-based PNG request helps identify victim’s Word version and IP, which can be used for tailored exploits and SIGINT collection.
- MITRE ATT&CK techniques identified in the article include Spearphishing Link, Gather Victim Network Information (IP addresses), and Gather Victim Host Information (Software).
- IoCs provided include specific IPs, domains, and document hashes that pinpoint the campaign infrastructure and artifacts (e.g., f6e755e2af0231a614975d64ea3c8116, f223e046dd4e3f98bfeb1263a78ff080).
MITRE Techniques
- [T1598.003] Spearphishing Link – “Spearphishing Link (T1598.003)” – The campaign uses phishing links in documents to lure victims.
- [T1590.005] Gather Victim Network Information – “Gather Victim Network Information IP Addresses (T1590.005)” – The HTTP requests help reveal victim IP addresses for reconnaissance.
- [T1592.002] Gather Victim Host Information – “Gather Victim Host Information Software (T1592.002)” – The campaign can infer the victim’s Word software version via requests to the embedded PNG.
Indicators of Compromise
- [IP] Infrastructural IPs – 79.110.52.218, 45.153.241.162
- [Domain] Infrastructure domains – baltdefcol.webredirect.org, wkoinfo.webredirect.org
- [Domain] Additional domain – jadlactnato.webredirect.org
- [File hash] Document hashes – f6e755e2af0231a614975d64ea3c8116, f223e046dd4e3f98bfeb1263a78ff080
- [File] Filenames referenced – War Bulletin April 27, 19:00 CET, logo.png
Read more: https://blog.sekoia.io/turla-new-phishing-campaign-eastern-europe/