Press ESC to close

UAC-0125 Abuses Cloudflare Workers to Distribute Malware Disguised as Army+ App

Category Details
Threat Actors UAC-0125 (linked to APT44, FROZENBARENTS, Sandworm, Seashell Blizzard, Voodoo Bear, GRU Unit 74455).
Campaign Overview UAC-0125 targets Ukrainian military personnel with fake Cloudflare Workers websites hosting malware disguised as the legitimate Army+ app.
Target Regions/Victims Ukrainian military personnel.
Methodology Malware disguised as an Army+ installer; PowerShell scripts for remote access using RSA key manipulation; private keys exfiltrated via TOR.
Product Targeted Army+ app for military personnel.
Malware Reference Fake Army+ installer leveraging NSIS; PowerShell script for OpenSSH installation and RSA key generation.
Tools Used NSIS, PowerShell scripts, TOR anonymity network.
Vulnerabilities Exploited Abuse of Cloudflare Workers for hosting malicious content.
TTPs Phishing using legitimate services; remote access via OpenSSH; private key exfiltration through TOR.
Attribution GRU Unit 74455 (Russian Federation); linked to broader APT activities by UAC-0125.
Recommendations Increase monitoring of Cloudflare services, enhance endpoint protection, restrict unknown PowerShell activities, and educate military personnel on phishing risks.
Source The Hackers News

Read full article: https://thehackernews.com/2024/12/uac-0125-abuses-cloudflare-workers-to.html

The above summary has been generated by an AI language model

Source: TheHackersNews

Published on: December 19, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *