BEST OF THE WEB

Russian Hacker Group APT 29 Target Diplomats And Government Agencies

Researchers at the cybersecurity firm Mandiant have uncovered a new campaign from state-sponsored Russian hacker group APT 29.

The malicious campaign targets diplomats and government agencies using spear phishing to deploy a novel strain of malware.

Victims are tricked into downloading the malicious files via spear-phishing emails disguised as embassy administrative updates.

To bypass spam filters and other detections, APT 29 used legitimate email addresses from other diplomatic entities while targeting large publicly available lists of embassy personnel.

The malicious mail sent to diplomats uses the malicious HTML dropper ROOTSAW (also known as EnvyScout) to deliver and decode IMG or ISO files.

Both IMG and ISO can be written to disk and execute a malicious .DLL file that contains the BEATDROP downloader.

BEATDROP and BEACON can guarantee backdoor access to a victim’s network. After that, they quickly deploy BOOMMIC to gain deeper access into the victim’s environment. Once BOOMMIC is deployed, it downloads malicious payloads into memory on a target machine.

IT World Canada Staff
IT World Canada Staffhttp://www.itworldcanada.com/
The online resource for Canadian Information Technology professionals.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

ITW in your inbox

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

More Best of The Web