Researchers have uncovered a new cyber-espionage campaign that leverages a dangerous PowerPoint vulnerability to deliver the Graphite malwa...
Researchers have uncovered a new cyber-espionage campaign that leverages a dangerous PowerPoint vulnerability to deliver the Graphite malware to target endpoints.
What makes this campaign particularly dangerous is the fact that the victims don’t actually need to click a link, or download the malware itself - a mouse hover is enough to trigger the attack.
Cybersecurity researchers Cluster25 recently spotted APT28, also known as Fancy Bear, distributing a PowerPoint (.PPT) presentation pretending to come from the Organization for Economic Co-Operation and Development (OECD).
State-sponsored actors
In the .PPT are two slides, containing a hyperlink. When the victim hovers their mouse over the hyperlink, it triggers a PowerShell script, using the SyncAppvPublishingServer utility, it was explained. The script downloads a JPEG file titled DSC0002.jpeg from a Microsoft OneDrive account. The JPEG is, in fact, an encrypted .DLL file called Imapi2.dll. This file later pulls and decrypts a second .JPEG - the Graphite malware in portable executable (PE) form.
As per Malpedia, Graphite was first discovered by researchers at Trellix, which described it as malware that uses Microsoft Graph API and OneDrive as its C2. Initially, it was being deployed in-memory, and its goal was to download the Empire post-exploitation agent.
APT28 is a well-known threat actor, allegedly on Russia’s payroll. Security experts believe the group is part of the Main Intelligence Directorate of the Russian General Staff, or GRU.
The group has been distributing Graphite via this technique since early September, the researchers believe, further adding that its most likely targets are organizations in defense and government sectors, of countries in the EU, as well as Eastern Europe.
Ever since the invasion of Ukraine, the cyber-war between Russia and the West has intensified. In mid-April this year, Microsoft reported taking down seven domains that Russian cybercriminals were using in cyberattacks against Ukrainian targets, mostly government institutions and the media.
- Check out our list of the best firewalls right now
Via: BleepingComputer
from TechRadar - All the latest technology news https://ift.tt/HJrnby9
via IFTTT
COMMENTS