Date:

Russia Hacks Starlink-Connected Devices in Ukraine

Secret Blizzard Malware: A Sophisticated Espionage Operation

Overview

Microsoft has uncovered a sophisticated malware operation, dubbed "Secret Blizzard," which has been using various tactics to target victims and gather sensitive information. The malware is believed to be linked to a group of threat actors who have been using the tools and infrastructure of at least six other threat groups over the past seven years.

Amadey Malware

The Amadey malware is believed to have been used by Secret Blizzard to download a PowerShell dropper on target devices. The PowerShell dropper contained a Base64-encoded Amadey payload, which was then used to install Tavdig, a backdoor used for conducting reconnaissance on targets of interest.

Tavdig Backdoor

Tavdig is a backdoor used by Secret Blizzard to collect information from device clipboards and harvest passwords from browsers. The malware would then install a custom reconnaissance tool on devices of further interest, such as those egressing from STARLINK IP addresses, a common signature of Ukrainian front-line military devices.

Storm-1837 Malware

Microsoft also discovered that Secret Blizzard used tools belonging to the Storm-1837 group to target Ukrainian military personnel. The malware was configured to use the Telegram API to launch a cmdlet with credentials for an account on the file-sharing platform Mega.

KazuarV2 Backdoor

The Tavdig backdoor was used to import a registry file, which was used to install and provide persistence for the KazuarV2 backdoor. The KazuarV2 backdoor was observed launching on affected devices, allowing Secret Blizzard to maintain control and access the compromised systems.

Conclusion

Secret Blizzard is a sophisticated malware operation that has been using various tactics to target victims and gather sensitive information. The group’s use of multiple threat groups’ tools and infrastructure highlights the complexity and adaptability of modern cyber threats. As cyberattacks continue to evolve, it is essential for organizations and individuals to stay vigilant and take measures to protect themselves from these threats.

Frequently Asked Questions

Q: What is the primary objective of the Amadey malware?
A: The primary objective of the Amadey malware is to download a PowerShell dropper on target devices, which contains a Base64-encoded Amadey payload and installs Tavdig, a backdoor used for conducting reconnaissance on targets of interest.

Q: What is the Tavdig backdoor used for?
A: The Tavdig backdoor is used to collect information from device clipboards and harvest passwords from browsers. It also installs a custom reconnaissance tool on devices of further interest.

Q: How does the Storm-1837 malware work?
A: The Storm-1837 malware is configured to use the Telegram API to launch a cmdlet with credentials for an account on the file-sharing platform Mega. It is likely that the malware is used to download commands or files for launch on the target device.

Q: What is the KazuarV2 backdoor used for?
A: The KazuarV2 backdoor is used to install and provide persistence for the malware on compromised devices, allowing Secret Blizzard to maintain control and access the affected systems.

Latest stories

Read More

LEAVE A REPLY

Please enter your comment!
Please enter your name here