Russia-Linked Cybercriminals Use Legitimate Tools in Attacks on German Firms

silversurfer

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
10,154
In a campaign targeting German companies, the infamous Russia-linked threat actor known as TA505 has been using legitimate tools in addition to malware, Prevailion reports.
Analysis of the attacks revealed the use of a trojanized version of a curriculum vitae (CV) to target the human resources department at German-speaking businesses. The observed source email addresses were created through vodafonemail.de.

During the initial phase of the attack, code within the CV file runs a script to fetch additional payloads and fingerprint the victim machine (installed programs, computer name and domain, etc). Next, the script attempts to gather saved credentials from browsers and mail applications, cookies, and credit card data, and kills task hosts and DLL hosts processes.

Stolen credentials are archived and sent to the attackers’ command and control (C&C) server, and then a scheduled task is created to serve as a heartbeat beacon. A BAT file then deletes all traces of the intrusion.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top