URL has been copied successfully!
Russia-linked APT29 targets European diplomats with new malware
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Russia-linked APT29 targets European diplomats with new malware

WINELOADER variant: While the Check Point researchers didn’t manage to obtain the final payload delivered by GRAPELOADER directly, they located a new variant of the WINELOADER backdoor that was uploaded to the VirusTotal scanning service around the same time and which has code and compilation time similarities to both AppvIsvSubsystems64.dll and ppcore.dll. As such, there is a strong possibility that it was used as part of the same campaign.The new WINELOADER variant comes in the form of a DLL called vmtools.dll that was likely also side-loaded by a benign executable. While the exact executable wasn’t discovered the legitimate DLL with the name vmtools.dll is part of VMWare Tools installer.DLL side-loading is an increasingly common technique used by attackers because it allows their malware code to be loaded into RAM memory by otherwise legitimate executable files that are unlikely to be detected as malware upon execution. APT29 has been known to use this tactic in past attacks as well.”The tactics, techniques, and procedures (TTPs) observed in this campaign bear strong similarities to those seen in the previous WINELOADER campaign from March 2024,” the researchers stated. “In that earlier attack, APT29 also initiated the campaign with a phishing email disguised as an invitation to a wine-tasting event, that time impersonating an Indian Ambassador.”The Check Point report contains indicators of compromise such as file names, file hashes and C2 URLs that can be used by security teams to build detections and threat hunting queries.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3964203/russia-linked-apt29-targets-european-diplomats-with-new-malware.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link