Poland says a state-backed threat group linked to Russia's military intelligence service has been targeting Polish government institutions throughout the week.
According to evidence found by CSIRT MON, the country's Computer Security Incident Response Team and CERT Polska, Russian APT28 state hackers attacked multiple government institutions in a large-scale phishing campaign.
Once clicked, the link redirected them through multiple websites before landing on a page that downloaded a ZIP archive.
The archive contained a malicious executable disguised as a JPG image file and two hidden files: a DLL and a.BAT script.
If the target opens the camouflaged executable file, it loads the DLL via DLL side loading, which runs the hidden script.
The tactics and infrastructure used in these attacks are identical to those used in another highly targeted campaign in which APT28 operatives used Israel-Hamas war lures to backdoor devices of officials from 13 nations, including United Nations Human Rights Council members, with Headlace malware.
Since it surfaced in the mid-2000s, the Russian state-backed hacking group has coordinated many high-profile cyber-attacks and was linked to GRU's Military Unit 26165 in 2018.
APT28 hackers were behind hacks of the Democratic National Committee and the Democratic Congressional Campaign Committee before the 2016 U.S. Presidential Election and the breach of the German Federal Parliament in 2015.
The United States charged multiple APT28 members for their involvement in the DNC and DCCC attacks in July 2018, while the Council of the European Union sanctioned APT28 in October 2020 for the Bundestag hack.
One week ago, NATO and the European Union, with international partners, also formally condemned a long-term APT28 cyber espionage campaign against multiple European countries, including Germany and Czechia.
Germany said the Russian threat group compromised many email accounts belonging to members of the Social Democratic Party's executive committee.
The Czech Ministry of Foreign Affairs also revealed that APT28 targeted some Czech institutions in the same Outlook campaign in 2023.
The attackers exploited the CVE-2023-23397 Microsoft Outlook vulnerability in the attack, a security flaw used as a zero-day to target NATO members in Europe, Ukrainian government agencies, and NATO fast reaction corps starting in April 2022.
NATO and EU condemn Russia's cyberattacks against Germany, Czechia.
Finland warns of Android malware attacks breaching bank accounts.
US govt warns of pro-Russian hacktivists targeting water facilities.
New Cuttlefish malware infects routers to monitor traffic for credentials.
Millions of Docker repos found pushing malware, phishing sites.
This Cyber News was published on www.bleepingcomputer.com. Publication date: Thu, 09 May 2024 23:15:28 +0000