sb-as logo
Story image

ESET researchers break down latest arsenal of the infamous Sednit group

23 May 2019

Researchers at the ESET R&D centre in Montreal have just published findings on their latest investigation into the infamous Sednit Group.

For several years, the Advanced Persistent Threat (APT) group Sednit (also known as APT28, Fancy Bear, Sofacy or STRONTIUM) has been attacking targets in Europe, Central Asia and the Middle East.

Since then, the number and diversity of component tools have increased drastically. As part of this discovery, ESET looked at Sednit’s backdoor Zebrocy, the capabilities of which have now increased, thanks to the ability to issue more than 30 different commands to compromised computers and gather considerable amounts of information about the target.

Zebrocy finishes its work rapidly as well: Once the backdoor sends basic information about its newly compromised system, the operators take control of the backdoor and start to send commands right away. Hence, the time between the victim running the downloader and the operators' first commands spans only a few minutes.

At the end of August 2018, the Sednit group launched a spear-phishing email campaign, in which it distributed shortened URLs that delivered first-stage Zebrocy components. However, it is unusual for the group to use this technique to deliver one of its malware components directly.

“Previously, it had used exploits to deliver and execute the first-stage malware, while in this campaign the group relied entirely on social engineering to lure victims into running the first part of the chain,” explains ESET team lead Alexis Dorais-Joncas.

ESET has recorded at least 20 clicks on the malicious link, however, the overall number of victims is impossible to estimate.

“Unfortunately, without the email message, we don't know if there are instructions issued to the user, either, if there is any further social engineering, or if it relies solely on the victim's curiosity. The archive contains two files; the first is an executable file, while the second is a decoy PDF document,” adds Dorais-Joncas.

First commands gather information about the victim's computer and environment, while other commands are used to retrieve files from the computer if the operators become aware of the presence of interesting files on the machine.

“The detection ratio is definitely lower in comparison to the usual backdoors. The very short time frame during which this backdoor is on the system and operating makes it harder to retrieve. Once its operators complete their evil deeds, they quickly remove it,” concluded Dorais-Joncas.

Story image
DDoS attacks a wake up call for complacent businesses - Imperva
When distributed denial of service attacks created mayhem around the world in August, they left many organisations scrambling to protect themselves.More
Story image
Cisco report: Remote working is here to stay, making cybersecurity a top priority
"With this new way of working here to stay and organisations looking to increase their investment in cybersecurity, there’s a unique opportunity to transform the way we approach security as an industry to better meet the needs of our customers and end-users.”More
Story image
The rising threat of human-controlled ransomware
Until recently, most ransomware attacks have been automated affairs. But things are changing, writes Attivo Networks regional director for A/NZ Jim Cook.More
Story image
Protegrity rolls out updates to data protection platform
Protegrity has updated its Protegrity Data Protection Platform to better secure sensitive data in hybrid-cloud, multi-cloud and SaaS environments.More
Story image
The business case for an in-house ethical hacker
Ethical hackers, also known as penetration testers or white-hat hackers, mimic the techniques used by malicious hackers to try and break into computer systems and discover vulnerabilities before the bad guys can exploit them.More
Story image
Google Cloud observes spike in DDoS volumes in last two years
Google Cloud has seen an ‘exponential’ rise in distributed denial of service (DDoS) attacks over the past decade, but the biggest attacks have only occurred in the past couple of years.More