Press ESC to close

Secret Blizzard Attack Detection: The russia-Linked APT Group Targets Ukraine via Amadey Malware to Deploy the Updated Kazuar Backdoor Version

CategoryDetails
Threat ActorsSecret Blizzard (also known as Turla, Turla APT, Waterbug, Venomous Bear, Iron Hunter, Krypton)
Campaign OverviewSecret Blizzard targeting Ukrainian military and government organizations, deploying custom malware like KazuarV2 and Tavdig
Target Regions (Victims)Ukraine, targeting military, diplomatic, and government sectors
MethodologyDeploying malware through the Amadey botnet, exploiting other hacker tools (Storm-1919, Storm-1837), PowerShell droppers, RC4 encryption techniques
Product TargetedMilitary devices, government infrastructure, Ukrainian systems connected to STARLINK IPs
Malware ReferenceKazuarV2 backdoor, Tavdig backdoor, Amadey bot, Storm-1919, Storm-1837, Andromeda USB-delivered malware
Tools UsedCustom reconnaissance tools, C2 panel access, RC4 encryption scripts, PowerShell dropper
Vulnerabilities ExploitedLeveraging compromised third-party infrastructure, hidden C2 panel access, DLL sideloading vulnerabilities
TTPsReconnaissance, credential theft, phishing attacks, deploying backdoors, stealth deployment, DLL sideloading, hiding behind other hacking groups
AttributionSecret Blizzard linked to Turla, FSB’s Center 16, Russian state-sponsored hacking groups, multiple aliases (Turla, Waterbug, Snake, Krypton)
RecommendationsCyber defenders should leverage detection platforms like SOC Prime, monitor C2 panel activity, use advanced threat intelligence for proactive defense
SourceSOCPrime

Read full article: https://socprime.com/blog/secret-blizzard-attack-detection/

The above summary has been generated by an AI language model

Source: SOC Prime

Published on: December 13, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *