{"id":645,"date":"2018-12-11T13:15:03","date_gmt":"2018-12-11T11:15:03","guid":{"rendered":"https:\/\/fortgale.com\/news\/?p=645"},"modified":"2022-03-30T09:47:08","modified_gmt":"2022-03-30T09:47:08","slug":"nato-event-gang-cybercriminals","status":"publish","type":"post","link":"https:\/\/fortgale.com\/blog\/cyber-security-news\/nato-event-gang-cybercriminals\/","title":{"rendered":"Today&#8217;s NATO event invitation used by a gang of cybercriminals"},"content":{"rendered":"<p style=\"text-align: justify\">Among the cyber attacks recorded daily, there are some of more sophisticated nature. They are called&nbsp;<strong>Advanced Persistent Threats (APTs)<\/strong>. These threats, among which&nbsp;some are&nbsp;<strong>state-sponsored<\/strong>, appear to be part of a&nbsp;<strong>Cyber Warfare<\/strong>&nbsp;scenario. Yet, they are as real as they can get and target specific information, such as company&nbsp;<strong>know-how<\/strong>,&nbsp;<strong>personal information<\/strong>&nbsp;or&nbsp;<strong>bank transactions<\/strong>.<\/p>\n<p style=\"text-align: justify\">A team of analysts with appropriate skills and tools are necessary to identify and combat these threats.<\/p>\n<p style=\"text-align: justify\">The following is an illustration of an attack which makes use of apparently reliable documents as an attack vector.<\/p>\n<h1>Description of the attack<\/h1>\n<p><strong>From the information we retrieved, the attack is attributable to the APT28 group (aka Fancy Bear or Sofacy), probably of Russian nationality, which has been using the same <em>modus operandi&nbsp;&nbsp;<\/em>for some years.<\/strong><\/p>\n<p style=\"text-align: justify\">In the analysis of the attack we find that a Word document armed with a malicious code is used as a vector. The code is similar to other codes previously used by the APT28 group. The document is related to a NATO event to be held between 11 and 13 December (<a href=\"https:\/\/events.sto.nato.int\/index.php\/upcoming-events\/event-list\/download.file\/791\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/events.sto.nato.int\/index.php\/upcoming-events\/event-list\/download.file\/791&amp;source=gmail&amp;ust=1544617870322000&amp;usg=AFQjCNF9VebxY-Ta9wRQzdpqzEAjYsM60Q\" rel=\"noopener\">LINK TO NATO WORD DOCUMENT<\/a>).<\/p>\n<p style=\"text-align: justify\"><img decoding=\"async\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2018\/12\/evento-300x243.png\" alt=\"\" width=\"780\" height=\"631\" class=\"wp-image-564 zoooom aligncenter\" loading=\"lazy\"><\/p>\n<p style=\"text-align: justify\">However, the Word document used by the attackers differs from the original, in that it includes a macro (which is password-protected) and a malware inside it. The malware is called&nbsp;<em>SedUploader.<\/em><\/p>\n<div id=\"attachment_567\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" aria-describedby=\"caption-attachment-567\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2018\/12\/Word_Malware-1024x460.png\" alt=\"NATO Word Malware\" width=\"750\" height=\"337\" class=\"size-large wp-image-567 zoooom\" loading=\"lazy\"><p id=\"caption-attachment-567\" class=\"wp-caption-text\">NATO Word Malware<\/p><\/div>\n<h1>The Malware<\/h1>\n<p style=\"text-align: justify\"><span>Upon opening the document, the malicious code is executed and the system is compromised. The files&nbsp;<\/span><i>UpdaterUI.dll<\/i><span>&nbsp;and&nbsp;<\/span><i>Uplist.dat<\/i><span>&nbsp;are thus created, as well as a registry key,&nbsp;<\/span><i>UlMgr<\/i><span>, which is meant to obtain persistence in the system.<\/span><\/p>\n<table border=\"1\" style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 100%\"><img decoding=\"async\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2018\/12\/passwordMacro.png\" alt=\"\" width=\"1070\" height=\"340\" class=\"alignnone wp-image-580 zoooom\" loading=\"lazy\"><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 100%\"><img decoding=\"async\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2018\/12\/binfile.png\" alt=\"\" width=\"1000\" height=\"345\" class=\"wp-image-575 zoooom alignnone\" loading=\"lazy\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table border=\"1\" style=\"border-collapse: collapse;width: 100%;height: 105px\">\n<tbody>\n<tr style=\"height: 105px\">\n<td style=\"width: 100%;height: 105px\"><img decoding=\"async\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2018\/12\/macro-1024x140.png\" alt=\"\" width=\"750\" height=\"103\" class=\"aligncenter wp-image-576 size-large zoooom\" loading=\"lazy\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table border=\"1\" style=\"border-collapse: collapse;width: 100%;height: 148px\">\n<tbody>\n<tr style=\"height: 148px\">\n<td style=\"width: 50%;height: 148px\"><img decoding=\"async\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2018\/12\/UpdaterUI.png\" alt=\"\" width=\"636\" height=\"264\" class=\"alignnone wp-image-584\" loading=\"lazy\"><\/td>\n<td style=\"width: 50%;height: 148px\"><img decoding=\"async\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2018\/12\/Uplist-300x79.png\" alt=\"\" width=\"660\" height=\"174\" class=\"zoooom aligncenter wp-image-583\" loading=\"lazy\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table border=\"1\" style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 100%\"><img decoding=\"async\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2018\/12\/Persistence.png\" alt=\"\" width=\"927\" height=\"192\" class=\"alignnone wp-image-581 zoooom\" loading=\"lazy\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h1>Command and Control Server<\/h1>\n<p style=\"text-align: justify\">The malware then contacts the command and control server registered at the domain<span>&nbsp;<\/span><i><a href=\"http:\/\/beatguitar.com\/\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=http:\/\/beatguitar.com&amp;source=gmail&amp;ust=1544621017713000&amp;usg=AFQjCNGSCfu-rXIP0AHBJI1ktUhmgNnjQA\" data-saferedirectreason=\"2\" rel=\"noopener\">beatguitar.com<\/a><\/i><span>&nbsp;<\/span>with IP address 185.99.133.72.<\/p>\n<p style=\"text-align: justify\">The malware adopts an&nbsp;<strong>anti-analysis technique<\/strong>&nbsp;that checks for the presence of&nbsp;<em>Wireshark&nbsp;<\/em>software in the system. If so, the malware contacts the<span>&nbsp;<\/span><i><a href=\"http:\/\/google.com\/\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=http:\/\/google.com&amp;source=gmail&amp;ust=1544621017714000&amp;usg=AFQjCNHaMNvjJ3oFIMMxvyLYqQ2WM7NpuA\" rel=\"noopener\">google.com<\/a><\/i><span>&nbsp;<\/span>domain instead.<\/p>\n<h1 style=\"text-align: justify\">Attribution &#8211; APT28\/Fan.Bear\/Sofacy<\/h1>\n<p style=\"text-align: justify\">Finding the true source of the attack is<span>&nbsp;<\/span><b>fundamental<\/b><span>&nbsp;<\/span>to identifying its objectives, intent and meaning. Getting to know this information is essential in order to undertake adequate countermeasures&nbsp;within the infrastructure, which span a vast array of&nbsp;<strong>Incident Response and Recovery&nbsp;<\/strong>activities as part of the company&#8217;s risk mitigation strategy.<\/p>\n<p style=\"text-align: justify\">In this particular case, the identification of the&nbsp;<strong>APT28<\/strong>&nbsp;group as a source of the attack is also confirmed by the&nbsp;<i>yara<\/i><span>&nbsp;<\/span>rule, which was created ad-hoc for this type of threat and shared by&nbsp; analysts within<span>&nbsp;<\/span>the&nbsp;<a href=\"https:\/\/github.com\/Neo23x0\/signature-base\">Github<\/a>&nbsp;project:<\/p>\n<table border=\"1\" style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 100%\"><img decoding=\"async\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2018\/12\/fr_yara.png\" alt=\"\" width=\"527\" height=\"409\" class=\"zoooom wp-image-588 aligncenter\" loading=\"lazy\"><\/p>\n<p style=\"text-align: center\">Yara Rule<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 100%\">\n<p style=\"text-align: center\"><img decoding=\"async\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2018\/12\/yara_rule-300x31.png\" alt=\"\" width=\"677\" height=\"70\" class=\"zoooom wp-image-589 aligncenter\" loading=\"lazy\">Rule result<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: justify\"><span>To the same end, the analysis of \u201c<\/span><em>Code Intelligence<\/em><span>\u201d also confirms the&nbsp;<\/span><strong>overlap of 97 strings of malware code<span>&nbsp;<\/span><\/strong><span>extracted with previous saples attributable to the&nbsp;<\/span><strong>APT28<\/strong><span>&nbsp;(or Sofacy) group.<\/span><\/p>\n<table border=\"1\" style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 100%\"><img decoding=\"async\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2018\/12\/sofacy_related-1024x489.png\" alt=\"\" width=\"750\" height=\"358\" class=\"wp-image-592 size-large zoooom aligncenter\" loading=\"lazy\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div><\/div>\n<div>\n<h1><span>Points to consider<\/span><\/h1>\n<p style=\"text-align: justify\">The highly volatile and fast-paced business environment is home to many different interests, but also to increasingly more sophisticated and varied threats. In light of this, every business entity should have in place <strong>adequate cybersecurity defense<\/strong> and incident response measures&nbsp; As a result, responsible and accountable governance systems will choose to invest wisely in&nbsp; <strong>risk mitigation<\/strong> strategies so as to guarantee business continuity. These span a vast array of activities within the Defence and Incident Response spectrum. <strong>Our analysts use top-notch tools and have highly sought skills in the business and military environments. Fortgale is part of an international community of specialists that collaborate to extract, analyze and share fresh information 24\/7. Have a look at our array of capabilities and services&nbsp;<a href=\"https:\/\/fortgale.com\/\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/fortgale.com&amp;source=gmail&amp;ust=1544621017714000&amp;usg=AFQjCNGn7w-yE0Ejdcr08VQpNxSCR6GTuw\" data-saferedirectreason=\"2\" rel=\"noopener\">here<\/a>.<\/strong><\/p>\n<h1><span>References<\/span><\/h1>\n<\/div>\n<p style=\"text-align: justify\">The analysis of Fortgale stems from the evidence gathered by a team of Threat Hunting, composed of @ MD0ugh, @DrunkBinary, @ r0ny_123, @Manu_De_Lucia, which identified and analyzed the threat. Further details at the <a href=\"https:\/\/www.emanueledelucia.net\/apt28-targeting-military-institutions\/\">link<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Among the cyber attacks recorded daily, there are some of more sophisticated nature. They are called&nbsp;Advanced Persistent Threats (APTs). These threats, among which&nbsp;some are&nbsp;state-sponsored, appear to be part of a&nbsp;Cyber Warfare&nbsp;scenario. Yet, they are as real as they can get and target specific information, such as company&nbsp;know-how,&nbsp;personal information&nbsp;or&nbsp;bank transactions. A team of analysts with appropriate [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":564,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[33,141,435,241,328],"class_list":["post-645","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-news","tag-apt28","tag-fancy-bear","tag-fortgale-report","tag-nato","tag-sofacy"],"_links":{"self":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts\/645","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/comments?post=645"}],"version-history":[{"count":1,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts\/645\/revisions"}],"predecessor-version":[{"id":4498,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts\/645\/revisions\/4498"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/media?parent=645"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/categories?post=645"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/tags?post=645"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}