Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Kermit the Frog providing start address at University of Maryland graduate

Government condemns Israel for firing diplomats in the West Bank | Israeli-Palestinian conflict news

Luminar secures up to $200 million after CEO departures and layoffs

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Russian hackers exploit email and VPN vulnerabilities to spy on Ukrainian Aid Logistics
Identity

Russian hackers exploit email and VPN vulnerabilities to spy on Ukrainian Aid Logistics

userBy userMay 21, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Russian cyberthreat actors have been attributed to state-sponsored campaigns targeting western logistics entities and technology companies since 2022.

This activity is rated as being coordinated by APT28 (aka Bluedelta, Fancy Bear, or Forest Blizzard). This is linked to the Russian General Staff Main Intelligence Bureau (GRU) 85th Main Special Service Center, Military Unit 26165.

Targets for the campaign include companies involved in coordinating, transporting and delivering foreign aid to Ukraine, according to a joint consultation released by Australia, Canada, the Czech Republic, Denmark, Estonia, France, Germany, the Netherlands, Poland, the UK and the US.

“This cyberspy-oriented campaign targeting logistics entities and technology companies uses a previously disclosed combination of TTPs and is likely linked to the large-scale targeting of these actors adjacent to Ukraine and NATO countries,” the bulletin said.

The vigilance comes weeks after the French Ministry of Foreign Affairs accused APT28 of increasing cyberattacks on 12 entities, including ministries, defense companies, research institutes and think tanks, in an attempt to destabilise the country since 2021.

Then last week, ESET removed what it called a campaign that it said has been in progress since 2023 by leveraging cross-site scripting (XSS) vulnerabilities in various webmail services such as Round Cube, Hold, Mdaemon, and Zimbra.

Cybersecurity

According to the latest advisory, the cyber attacks organized by APT28 include a combination of password spray, spear phishing and Microsoft Exchange Mailbox Permissions for spying purposes.

The main goals of the campaign include organizations within NATO member states and Ukraine, as well as vertically spanning defense, transport, maritime, air traffic management and IT services. It is estimated that many entities from Bulgaria, the Czech Republic, France, Germany, Greece, Italy, Moldova, the Netherlands, Poland, Romania, Slovakia, Ukraine and the United States have been targeted.

Initial access to the target network is said to have been promoted by utilizing seven different methods –

Brute Force Attack provides a SOHO device compromise spear phishing attack to infer credentials and provide malware exploitation of Outlook NTLM Vulnerability (CVE-2023-23397) using fake login pages that impersonate a western cloud mail provider hosted on a SOHO device hosted on a free third-party service or a compromised SOHO device. (CVE-2020-12641, CVE-2020-35730, CVE-2021-44026) Exploiting Internet infrastructure such as corporate VPNs, such as public vulnerabilities of WINRAR vulnerabilities and the use of SQL injection (CVE-2023-38831)

If an actor in Unit 26165 acquires scaffolding using any of the methods above, the attack proceeds to the post-explosion stage. This involves reconnaissance to identify individuals responsible for coordinating the transport, as well as other companies working with the victim entities.

It has also been observed that attackers remove information from the Active Directory using tools for lateral movements such as Impacket, Psexec, and Remote Desktop Protocol (RDP), as well as Actipy and Adexplorer.exe.

“The actors will take steps to find and remove the list of Office 365 users and set up a sustained email collection,” the agency noted. “The actors used the mailbox permissions operation to establish a persistent email collection with compromised logistics entities.”

Another notable feature of intrusion is the use of malware families such as headlace and macipie to establish the persistence of compromised hosts and harvest sensitive information. There is no evidence that malware variations such as OceanMap and Steelhooks are used to directly target the logistics or IT sector.

Cybersecurity

During data removal, threat actors rely on a variety of methods based on the victim environment, often using PowerShell commands to create ZIP archives to upload the collected data to their own infrastructure, or employing Exchange Web Services (EWS) and Internet Message Access Protocol (IMAP) for Siphon information from email servers.

“As Russian military failed to meet its military targets and Western countries provided assistance to support Ukraine’s territorial defense, Unit 26165 expanded targeting of logistics entities and technology companies involved in providing assistance,” the agency said. “These actors are targeting internet-connected cameras at Ukraine’s border crossings to monitor and track aid shipments.”

Disclosure occurs as it has become clear that the CATO network is leveraging Tigris Object Storage, Oracle Cloud Infrastructure (OCI) Object Storage, and Scaleway Object Storage, which uses clickfix-style lures to download Lumma Steeler using Clickfix-style lures.

“Recent campaigns leveraging Tigris Object Storage, OCI Object Storage, and Scaleway Object Storage are built on previous methods and introduce new distribution mechanisms aimed at avoiding and targeting technically skilled users.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleJony Ive, leading the design work for Openai, following his $6.5 billion acquisition of the company.
Next Article AI infrastructure startup Crusoe raises $11.6 billion to build Openai’s largest data center in Texas
user
  • Website

Related Posts

Purerat Malware Spikes 4X will deploy PureLogs to target Russian companies in 2025

May 21, 2025

Fake Kling AI Facebook ads deliver rat malware to over 22 million potential victims

May 21, 2025

Protect your CI/CD workflow with Wazuh

May 21, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Kermit the Frog providing start address at University of Maryland graduate

Government condemns Israel for firing diplomats in the West Bank | Israeli-Palestinian conflict news

Luminar secures up to $200 million after CEO departures and layoffs

US Department of Justice Ends George Floyd Police Village After George Floyd Police Reform | Donald Trump News

Trending Posts

Government condemns Israel for firing diplomats in the West Bank | Israeli-Palestinian conflict news

May 22, 2025

US Department of Justice Ends George Floyd Police Village After George Floyd Police Reform | Donald Trump News

May 21, 2025

Netanyahu says Israel will control “all Gaza” after the latest attacks | News

May 21, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Today, May 21, 2025 Top Tech Startup Funding News

AI: Humanity’s New Shield Against Nature’s Fury

Openai and Jony Ive team up to create a “new generation of AI-powered computers.”

AI infrastructure startup Crusoe raises $11.6 billion to build Openai’s largest data center in Texas

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.