• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • The 2023 Complete AWS Cloud Engineer, Developer & Architect Course Bundle for $49

    The 2023 Complete AWS Cloud Engineer, Developer & Architect Course Bundle for $49
  • The 2023 All-In-One Raspberry Pi & Arduino Developer Bundle for $69

    The 2023 All-In-One Raspberry Pi & Arduino Developer Bundle for $69
  • The 2023 Complete Project Management Agile & Scrum Mastery Platinum Bundle for $39

    The 2023 Complete Project Management Agile & Scrum Mastery Platinum Bundle for $39
  • The 2023 Ultimate Artificial Intelligence & Automation Developer Bundle for $59

    The 2023 Ultimate Artificial Intelligence & Automation Developer Bundle for $59
  • Apple iPad Pro 3rd Gen 12" 4GB RAM 256GB SSD – Space Gray (Refurbished: Wi-Fi Only) for $687

    Apple iPad Pro 3rd Gen 12" 4GB RAM 256GB SSD – Space Gray (Refurbished: Wi-Fi Only) for $687
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

Winter Vivern APT Group Targeting Indian, Lithuanian, Slovakian, and Vatican Officials

Mar 17, 2023 by iHash Leave a Comment

APT Group

The advanced persistent threat known as Winter Vivern has been linked to campaigns targeting government officials in India, Lithuania, Slovakia, and the Vatican since 2021.

The activity targeted Polish government agencies, the Ukraine Ministry of Foreign Affairs, the Italy Ministry of Foreign Affairs, and individuals within the Indian government, SentinelOne said in a report shared with The Hacker News.

“Of particular interest is the APT’s targeting of private businesses, including telecommunications organizations that support Ukraine in the ongoing war,” senior threat researcher Tom Hegel said.

Winter Vivern, also tracked as UAC-0114, drew attention last month after the Computer Emergency Response Team of Ukraine (CERT-UA) detailed a new malware campaign aimed at state authorities of Ukraine and Poland to deliver a piece of malware dubbed Aperetif.

Previous public reports chronicling the group show that it has leveraged weaponized Microsoft Excel documents containing XLM macros to deploy PowerShell implants on compromised hosts.

While the origins of the threat actor are unknown, the attack patterns suggest that the cluster is aligned with objectives that support the interests of Belarus and Russia’s governments.

UAC-0114 has employed a variety of methods, ranging from phishing websites to malicious documents, that are tailored to the targeted organization to distribute its custom payloads and gain unauthorized access to sensitive systems.

In one batch of attacks observed in mid-2022, Winter Vivern set up credential phishing web pages to lure users of the Indian government’s legitimate email service email.gov[.]in.

Typical attack chains involve using batch scripts masquerading as virus scanners to trigger the deployment of the Aperetif trojan from actor-controlled infrastructure such as compromised WordPress sites.

Aperetif, a Visual C++-based malware, comes with features to collect victim data, maintain backdoor access, and retrieve additional payloads from the command-and-control (C2) server.

“The Winter Vivern APT is a resource-limited but highly creative group that shows restraint in the scope of their attacks,” Hegel said.

“Their ability to lure targets into the attacks, and their targeting of governments and high-value private businesses demonstrate the level of sophistication and strategic intent in their operations.”

While Winter Vivern may have managed to evade the public eye for extended periods of time, one group that’s not too concerned about staying under the radar is Nobelium, which shares overlaps with APT29 (aka BlueBravo, Cozy Bear, or The Dukes).

The Kremlin-backed nation-state group, notorious for the SolarWinds supply chain compromise in December 2020, has continued to evolve its toolset, developing new custom malware like MagicWeb and GraphicalNeutrino.

It has also been attributed to yet another phishing campaign directed against diplomatic entities in the European Union, with specific emphasis on agencies that are “aiding Ukrainian citizens fleeing the country, and providing help to the government of Ukraine.”

“Nobelium actively collects intelligence information about the countries supporting Ukraine in the Russia-Ukraine war,” BlackBerry said. “The threat actors carefully follow geopolitical events and use them to increase their possibility of a successful infection.”

The phishing emails, spotted by the company’s research and intelligence team, contain a weaponized document that includes a link pointing to an HTML file.

WEBINAR

Discover the Hidden Dangers of Third-Party SaaS Apps

Are you aware of the risks associated with third-party app access to your company’s SaaS apps? Join our webinar to learn about the types of permissions being granted and how to minimize risk.

RESERVE YOUR SEAT

The weaponized URLs, hosted on a legitimate online library website based in El Salvador, features lures related to LegisWrite and eTrustEx, both of which are used by E.U. nations for secure document exchange.

The HTML dropper (dubbed ROOTSAW or EnvyScout) delivered in the campaign embeds an ISO image, which, in turn, is designed to launch a malicious dynamic link library (DLL) that facilitates the delivery of a next-stage malware via Notion’s APIs.

The use of Notion, a popular note-taking application, for C2 communications was previously revealed by Recorded Future in January 2023. It’s worth noting that APT29 has employed various online services like Dropbox, Google Drive, Firebase, and Trello in an attempt to evade detection.

“Nobelium remains highly active, executing multiple campaigns in parallel targeting government organizations, non-governmental organizations (NGOs), intergovernmental organizations (IGOs), and think tanks across the U.S., Europe, and Central Asia,” Microsoft stated last month.

The findings also come as enterprise security firm Proofpoint disclosed aggressive email campaigns orchestrated by a Russia-aligned threat actor called TA499 (aka Lexus and Vovan) since early 2021 to trick targets into participating in recorded phone calls or video chats and extract valuable information.

“The threat actor has engaged in steady activity and expanded its targeting to include prominent businesspeople and high-profile individuals that have either made large donations to Ukrainian humanitarian efforts or those making public statements about Russian disinformation and propaganda,” the company said.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: apt, computer security, cyber attacks, cyber news, cyber security news, cyber security news today, cyber security updates, cyber updates, data breach, Group, hacker news, hacking news, how to hack, Indian, information security, Lithuanian, network security, Officials, ransomware malware, Slovakian, software vulnerability, Targeting, the hacker news, Vatican, Vivern, Winter

Special Offers

  • The 2023 Complete AWS Cloud Engineer, Developer & Architect Course Bundle for $49

    The 2023 Complete AWS Cloud Engineer, Developer & Architect Course Bundle for $49
  • The 2023 All-In-One Raspberry Pi & Arduino Developer Bundle for $69

    The 2023 All-In-One Raspberry Pi & Arduino Developer Bundle for $69
  • The 2023 Complete Project Management Agile & Scrum Mastery Platinum Bundle for $39

    The 2023 Complete Project Management Agile & Scrum Mastery Platinum Bundle for $39
  • The 2023 Ultimate Artificial Intelligence & Automation Developer Bundle for $59

    The 2023 Ultimate Artificial Intelligence & Automation Developer Bundle for $59
  • Apple iPad Pro 3rd Gen 12" 4GB RAM 256GB SSD – Space Gray (Refurbished: Wi-Fi Only) for $687

    Apple iPad Pro 3rd Gen 12" 4GB RAM 256GB SSD – Space Gray (Refurbished: Wi-Fi Only) for $687

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

How to restore information in an edited screenshot

How to restore information in an edited screenshot

Mar 28, 2023 By iHash

Acceldata and its Data Observability Platform – Solving Big Data Management Challenges

Mar 28, 2023 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management Secure security security breaches security vulnerabilities software vulnerability the hacker news Threat update video Vulnerabilities web applications

Latest

Trojanized TOR Browser Installers Spreading Crypto-Stealing Clipper Malware

Mar 29, 2023Ravie LakshmananCryptocurrency / Malware Trojanized installers for the TOR anonymity browser are being used to target users in Russia and Eastern Europe with clipper malware designed to siphon cryptocurrencies since September 2022. “Clipboard injectors […] can be silent for years, show no network activity or any other signs of presence until the disastrous […]

Apple introduces Apple Pay Later

March 28, 2023 PRESS RELEASE Apple introduces Apple Pay Later to allow consumers to pay for purchases over time Apple Pay users can split purchases into four payments with zero interest and no fees CUPERTINO, CALIFORNIA Apple today introduced Apple Pay Later in the U.S. Designed with users’ financial health in mind, Apple Pay Later1 allows users […]

Stealthy DBatLoader Malware Loader Spreading Remcos RAT and Formbook in Europe

Mar 28, 2023Ravie LakshmananMalware Attack / Hacking A new phishing campaign has set its sights on European entities to distribute Remcos RAT and Formbook via a malware loader dubbed DBatLoader. “The malware payload is distributed through WordPress websites that have authorized SSL certificates, which is a common tactic used by threat actors to evade detection […]

The 2023 Complete Project Management Agile & Scrum Mastery Platinum Bundle for $39

Expires March 27, 2123 23:59 PST Buy now and get 94% off KEY FEATURES Are you tired of feeling stuck in a dead-end job or career? Are you ready to take control of your future and start enjoying the benefits of a fun, fulfilling, and lucrative Scrum career? This bestselling Scrum course will reveal how […]

Scale to Survive: How to Attract Investors in a Post-SVB World

The bigger they come, the harder they fall… unless the Federal Reserve steps in to bail them out. That was the good news for depositors in the now-defunct Silicon Valley Bank, which imploded in a brutal 48-hour run last week. But bond and stockholders lost their hats. The message to innovators is clear: If you […]

The 2023 Ultimate Artificial Intelligence & Automation Developer Bundle for $59

Expires March 27, 2123 23:59 PST Buy now and get 97% off Introduction to the Latest Artificial Intelligence Tools KEY FEATURES Whether you like it or not….artificial intelligence is here.​ It’s already changing the way we function in our personal lives (even if you might not realize it yet). And It’s already having a massive […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT