Monday, 12 May 2025
  • My Feed
  • My Interests
  • My Saves
  • History
  • Blog
Subscribe
Capernaum
  • Finance
    • Cryptocurrency
    • Stock Market
    • Real Estate
  • Lifestyle
    • Travel
    • Fashion
    • Cook
  • Technology
    • AI
    • Data Science
    • Machine Learning
  • Health
    HealthShow More
    Skincare as You Age Infographic
    Skincare as You Age Infographic

    When I dove into the scientific research for my book How Not…

    By capernaum
    Treating Fatty Liver Disease with Diet 
    Treating Fatty Liver Disease with Diet 

    What are the three sources of liver fat in fatty liver disease,…

    By capernaum
    Bird Flu: Emergence, Dangers, and Preventive Measures

    In the United States in January 2025 alone, approximately 20 million commercially-raised…

    By capernaum
    Inhospitable Hospital Food 
    Inhospitable Hospital Food 

    What do hospitals have to say for themselves about serving meals that…

    By capernaum
    Gaming the System: Cardiologists, Heart Stents, and Upcoding 
    Gaming the System: Cardiologists, Heart Stents, and Upcoding 

    Cardiologists can criminally game the system by telling patients they have much…

    By capernaum
  • Sport
  • 🔥
  • Cryptocurrency
  • Data Science
  • Travel
  • Real Estate
  • AI
  • Technology
  • Machine Learning
  • Stock Market
  • Finance
  • Fashion
Font ResizerAa
CapernaumCapernaum
  • My Saves
  • My Interests
  • My Feed
  • History
  • Travel
  • Health
  • Technology
Search
  • Pages
    • Home
    • Blog Index
    • Contact Us
    • Search Page
    • 404 Page
  • Personalized
    • My Feed
    • My Saves
    • My Interests
    • History
  • Categories
    • Technology
    • Travel
    • Health
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Home » Blog » Russian Secret Blizzard hackers exploit malware to target Ukrainian forces
Data Science

Russian Secret Blizzard hackers exploit malware to target Ukrainian forces

capernaum
Last updated: 2024-12-12 15:07
capernaum
Share
Russian Secret Blizzard hackers exploit malware to target Ukrainian forces
SHARE

Russian Secret Blizzard hackers exploit malware to target Ukrainian forces

Russian nation-state actor Secret Blizzard has intensified its cyber-espionage efforts against Ukrainian military assets during 2024. Linked to Russia’s Federal Security Service (FSB), the group has effectively used infrastructure and tools from various cyber actors. Key techniques include deploying sophisticated custom malware, conducting strategic watering hole attacks, and spear phishing.

Secret Blizzard targets Ukraine’s military using custom malware

Secret Blizzard’s strategy centers on exploiting infrastructure tied to other actors, such as Storm-1919 and Storm-1837. This method enhances access to specific targets, particularly military personnel and devices. By managing to diversify their attack vectors, they can penetrate critical systems more effectively.

The organization employs several distinct malware tools, including the Tavdig backdoor and KazuarV2 payloads. These tools are designed to maintain persistent access and gather intelligence. The Tavdig backdoor has been notably deployed in high-stakes environments associated with the Ukrainian military’s front-line operations.

Astutely, Secret Blizzard utilized the Amadey bot in March and April 2024 to distribute their Tavdig backdoors. The Amadey bot, typically used for cryptomining, allowed the group to gain a foothold in target devices. This iteration, version 4.18, possessed reconnaissance capabilities that included gathering device information and collecting credentials through various plugins.

Secret Blizzard further deployed a custom reconnaissance tool aimed at devices stemming from STARLINK IP addresses. This tool collected crucial data, including system configurations and directories. Data transmission occurred through RC4 encryption protocols to a command-and-control (C2) server.


Lazarus Group targets macOS with RustyAttr trojan malware


The KazuarV2 payload employed by Secret Blizzard was often injected into trusted processes to ensure stealth. Deploying DLL sideloading techniques, it successfully circumvented detection measures put in place by the victims. Similarly, the Storm-1837 backdoor, introduced in December 2023, permitted the group to establish ongoing access to Ukrainian drone operators’ devices.

The deployment included utilizing the Telegram API for credentialed file-sharing platform connections, enabling the installation of further malicious payloads remotely.

In light of these sophisticated attacks, organizations are urged to bolster their defenses. Recommendations include strengthening endpoint security through Microsoft Defender’s tamper protection and real-time features. This should be complemented by the implementation of network protections, including monitoring PowerShell activities and restricting unauthorized scripts.

To monitor for indicators of compromise (IOCs), tracking specific domains such as citactica.com and icw2016.coachfederation.cz is essential. Regular querying for suspicious PowerShell activity should also be part of a proactive defense mechanism.


Featured image credit: Philipp Katzenberger/Unsplash

Share This Article
Twitter Email Copy Link Print
Previous Article Will Solana Price Hit $300 Before Christmas? Will Solana Price Hit $300 Before Christmas?
Next Article Update Chrome immediately: Two high-risk vulnerabilities revealed Update Chrome immediately: Two high-risk vulnerabilities revealed
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Using RSS feeds, we aggregate news from trusted sources to ensure real-time updates on the latest events and trends. Stay ahead with timely, curated information designed to keep you informed and engaged.
TwitterFollow
TelegramFollow
LinkedInFollow
- Advertisement -
Ad imageAd image

You Might Also Like

Top 5 AI research assistants that compete with ChatGPT
AIData Science

Top 5 AI research assistants that compete with ChatGPT

By capernaum
Nextdoor ads get an AI-powered safety shield from IAS
AIData Science

Nextdoor ads get an AI-powered safety shield from IAS

By capernaum

Custom Python Decorator Patterns Worth Copy-Pasting Forever

By capernaum
Sigenergy flexes full AI energy suite at Intersolar Europe
AIData Science

Sigenergy flexes full AI energy suite at Intersolar Europe

By capernaum
Capernaum
Facebook Twitter Youtube Rss Medium

Capernaum :  Your instant connection to breaking news & stories . Stay informed with real-time coverage across  AI ,Data Science , Finance, Fashion , Travel, Health. Your trusted source for 24/7 insights and updates.

© Capernaum 2024. All Rights Reserved.

CapernaumCapernaum
Welcome Back!

Sign in to your account

Lost your password?