Ukrainian Government Targeted by Russian Hackers APT28 Using Fake Windows Update Emails

0
Fake Windows Update Emails

Malware has been circulated via fake email addresses that seem to be representing Ukrainian government authorities.

windows update
windows update

APT28, a group of Russian state-sponsored cybercriminals, aka Fancy Bear, has been attacking Ukrainian government institutions with malware cloaked in fake emails claiming to be from Microsoft.

The fake links are distributed via emails from Outlook accounts that resemble those of Ukrainian government agencies.

The attacks were executed around April, according to a warning issued by the Computer Emergency Response Team of Ukraine (CERT-UA).

APT28 found Attacking Ukrainian Government

The email was with the subject line “Windows Update” from the email addresses of Outlook Webmail Service. However, it seemed to be from the officials’ surname & initials.

CERT-UA showed a sample letter giving instructions in the Ukranian language for “updates to protect against hacker attacks, also pictures containing the procedure of executing a command line & a shell command.

Instructions sent to targets CERT UA
Instructions sent to targets CERT UA

Warning

“The mentioned command will download a PowerShell script that, simulating the process of updating the operating system, will download and execute a PowerShell script designed to collect basic information about the computer using the ‘tasklist’ and ‘systeminfo’ commands.”

It’s a suggestion from CERT-UA any firm finding itself at risk should disable the Launch PowerShell/ option for users.

Fake Windows Update Emails

APT28 is a well-established Cybercriminal Gang

Security firms have been closely monitoring the Russian cybercriminal group APT28, also known as Fancy Bear, Pawn Storm, the Sednit Gang, and Sofacy, since 2014.

Through the use of a Cisco router security flaw, it has recently been actively targeting organizations in the US, Europe, and Ukraine.

The National Security Agency, the Cybersecurity and Infrastructure Agency, the Federal Bureau of Investigation, and the UK National Cybersecurity Centre issued a joint advisory last month stating that “APT28 has been observed to gain access prone routers by using default and weak SNMP group strings, also by exploiting CVE-2017-6742.”

The cybersecurity organizations stated that they think APT28 is somehow linked to GRU, the Russian security service.

Illia Vitiuk, Cyber Information Security Head, Security Service, Ukraine

It was one of the most popular cyberattacks executed by Ukraine during the battle.

“More than 90% of all cyberattacks targeting Ukraine are either conducted by special services or by state-sponsored groups.”

A suggestion from him was that Pro-Russian Hacktivists were not as huge as the cyber group stated so far.

“I believe that there is no so-called ‘hacktivism’ in Russia at all.”

Fake-Windows-Update-Emails

Cyber Security course

Kindly read another article:

The Impact of Cyberattacks on SMEs is Examined in “Small Businesses, Big Risks: Cyberattacks” Devastating Effects on SMEs

Nigerian National from Delhi is Detained by Pune Police for Online Gift Scam

RSAC 2023 Revealed 10 Innovative and Amazing Cybersecurity Tools

 

 

 

About Author

Leave a Reply

Your email address will not be published. Required fields are marked *

en_USEnglish
Open chat
Hello
Can we help you?