• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

New APT Group Red Stinger Targets Military and Critical Infrastructure in Eastern Europe

You are here: Home / Cyber Security News / New APT Group Red Stinger Targets Military and Critical Infrastructure in Eastern Europe

A previously undetected advanced persistent threat (APT) actor dubbed Crimson Stinger has been joined to attacks concentrating on Eastern Europe because 2020.

“Armed forces, transportation, and critical infrastructure ended up some of the entities becoming targeted, as perfectly as some involved in the September East Ukraine referendums,” Malwarebytes disclosed in a report published today.

“Depending on the marketing campaign, attackers managed to exfiltrate snapshots, USB drives, keyboard strokes, and microphone recordings.”

Red Stinger overlaps with a risk cluster Kaspersky exposed beneath the title Lousy Magic final month as possessing qualified govt, agriculture, and transportation companies situated in Donetsk, Lugansk, and Crimea final 12 months.

Although there ended up indications that the APT group might have been energetic due to the fact at least September 2021, the latest findings from Malwarebytes force the group’s origins back by almost a yr, with the initial procedure having put in December 2020.

The attack chain, at the time, is reported to have leveraged destructive installer information to drop the DBoxShell (aka PowerMagic) implant on compromised programs. The MSI file, for its section, is downloaded by means of a Windows shortcut file contained inside a ZIP archive.

Subsequent waves detected in April and September 2021 have been noticed to leverage identical attack chains, albeit with insignificant versions in the MSI file names.

A fourth set of assaults coincided with the onset of Russia’s armed forces invasion of Ukraine in February 2022. The previous identified exercise connected with Purple Stinger took area in September 2022, as documented by Kaspersky.

“DBoxShell is malware that utilizes cloud storage solutions as a command-and-control (C&C) system,” security scientists Roberto Santos and Hossein Jazi explained.

“This stage serves as an entry stage for the attackers, enabling them to evaluate regardless of whether the targets are fascinating or not, which means that in this period they will use different tools.”

The fifth operation is also notable for providing an different to DBoxShell referred to as GraphShell, which is so named for its use of the Microsoft Graph API for C&C needs.

The preliminary infection phase is followed by the danger actor deploying supplemental artifacts like ngrok, rsockstun (a reverse tunneling utility), and a binary to exfiltrate sufferer information to an actor-managed Dropbox account.

The exact scale of the infections are unclear, despite the fact that proof details to two victims situated in central Ukraine – a military concentrate on and an officer performing in critical infrastructure – who were being compromised as aspect of the February 2022 assaults.

Approaching WEBINARLearn to Quit Ransomware with Actual-Time Defense

Sign up for our webinar and find out how to quit ransomware assaults in their tracks with actual-time MFA and services account defense.

Help save My Seat!

In both equally occasions, the menace actors exfiltrated screenshots, microphone recordings, and place of work files soon after a period of time of reconnaissance. 1 of the victims also experienced their keystrokes logged and uploaded.

The September 2022 intrusion established, on the other hand, is noteworthy for the simple fact that it mainly singled out Russia-aligned areas, which includes officers and people today associated in elections. One particular of the surveillance targets had data from their USB drives exfiltrated.

Malwarebytes mentioned it also discovered a library in the Ukrainian city of Vinnytsia that was infected as element of the similar campaign, generating it the only Ukraine-relevant entity to be specific. The motivations are presently unknown.

Even though the origins of the danger team are a thriller, it has emerged that the danger actors managed to infect their individual Windows 10 devices at some issue in December 2022, possibly accidentally or for testing purposes (presented the name TstUser), presenting an perception into their modus operandi.

Two factors stand out: The decision of English as the default language and the use of Fahrenheit temperature scale to screen the climate, probable suggesting the involvement of indigenous English speakers.

“In this situation, attributing the attack to a certain region is not an effortless undertaking,” the scientists reported. “Any of the included nations or aligned teams could be accountable, as some victims ended up aligned with Russia, and many others were being aligned with Ukraine.”

“What is distinct is that the principal motive of the attack was surveillance and data accumulating. The attackers used various levels of protection, experienced an comprehensive toolset for their victims, and the attack was obviously specific at precise entities.”

Observed this report attention-grabbing? Follow us on Twitter  and LinkedIn to read far more exclusive content we publish.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « Spanish Police Takes Down Massive Cybercrime Ring, 40 Arrested
Next Post: “Greatness” Phishing Tool Exploits Microsoft 365 Credentials »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS
  • New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS App

Copyright © 2025 · AllTech.News, All Rights Reserved.