The Pc Emergency Response Workforce of Ukraine (CERT-UA) reviews a few new marketing campaign dubbed “SickSync,” launched by the UAC-0020 (Vermin) hacking group in assaults on the Ukrainian protection forces.
The risk group is linked to the Luhansk Individuals’s Republic (LPR) area, which Russia has occupied virtually in its entirety since October 2022. The hacker’s actions generally align with Russia’s pursuits.
The assault makes use of the professional file-syncing software program SyncThing together with malware referred to as SPECTR.
Vermin’s obvious motive is to steal delicate data from navy organizations.
Assault particulars
The assault begins with a phishing e mail despatched to the goal, carrying a password-protected RARSFX archive named “turrel.fop.wolf.rar.”
Upon launching the file, it extracts a PDF (“Wowchok.pdf”), an installer (“sync.exe”), and a BAT script (“run_user.bat”). The BAT executes sync.exe, which comprises SyncThing and SPECTR malware, together with the required libraries.
SyncThing establishes a peer-to-peer connection for information synchronization, which is used for stealing paperwork and account passwords.
The professional instrument is modified with new listing names and scheduled duties to evade identification, whereas the element that shows a window when it is energetic has been eliminated.
SPECTR is a modular malware that has the next capabilities:
- SpecMon: Calls PluginLoader.dll to execute DLLs containing the “IPlugin” class.
- Screengrabber: Takes screenshots each 10 seconds when particular program home windows are detected.
- FileGrabber: Makes use of robocopy.exe to repeat recordsdata from person directories corresponding to Desktop, MyPictures, Downloads, OneDrive, and DropBox.
- Usb: Copies recordsdata from detachable USB media.
- Social: Steals authentication information from numerous messengers like Telegram, Sign, Skype, and Ingredient.
- Browsers: Steals information from browsers together with Firefox, Edge, and Chrome, specializing in authentication information, session data, and shopping historical past.
Knowledge stolen by SPECTR is copied into subfolders inside the ‘%APPDATApercentsyncServe_Sync’ listing and subsequently transferred via syncing to the risk actor’s system.
CERT-UA believes Vermin determined to make use of a professional instrument for information exfiltration to cut back the chance of safety techniques flagging the community site visitors as suspicious.
The cybersecurity company notes that any interplay with SyncThing’s infrastructure (e.g., *.syncthing.internet) needs to be sufficient to think about a system compromised and launch an investigation to detect and uproot the an infection.