Your Yello Ring Road To Success
GOOGLE LOGIN MY ADS MY SHOP

Russian Hackers Tricked Ukrainians with Fake “DoS Android Apps to Target Russia”

DoS Android Apps

Russian threat actors capitalized on the ongoing conflict[1]
against Ukraine to distribute Android malware camouflaged as an app
for pro-Ukrainian hacktivists to launch distributed
denial-of-service (DDoS) attacks against Russian sites.

Google Threat Analysis Group (TAG) attributed the malware to
Turla, an advanced persistent threat also known as Krypton,
Venomous Bear, Waterbug, and Uroburos, and linked to Russia’s
Federal Security Service (FSB).

“This is the first known instance of Turla distributing
Android-related malware,” TAG researcher Billy Leonard said[2]. “The apps were not
distributed through the Google Play Store, but hosted on a domain
controlled by the actor and disseminated via links on third party
messaging services.”

CyberSecurity

It’s worth noting that the onslaught[3]
of cyberattacks[4]
in the immediate aftermath of Russia’s unprovoked invasion of
Ukraine prompted the latter to form an IT Army[5]
to stage counter-DDoS attacks against Russian websites. The goal of
the Turla operation, it appears, is to use this volunteer-run
effort to their own advantage.

The decoy app[6]
was hosted on a domain masquerading as the Azov Regiment[7], a unit of the National
Guard of Ukraine, calling on people from around the world to fight
“Russia’s aggression” by initiating a denial-of-service attack on
the web servers belonging to “Russian websites to overwhelm their
resources.”

DoS Android Apps

Google TAG said the actors drew inspiration from another Android
app distributed through a website named “stopwar[.]pro” that’s also
designed to conduct DoS attacks by continually sending requests to
the target websites.

That said, the actual number of times the malicious Cyber Azov
app was installed is minuscule, posing no major impact on Android
users.

Additionally, the Sandworm group (aka Voodoo Bear) has been
connected to a separate set of malicious activities leveraging the
Follina vulnerability[8]
(CVE-2022-30190) in the Microsoft Windows Support Diagnostic Tool
(MSDT) to send links pointing to Microsoft Office documents hosted
on compromised websites targeting media entities in Ukraine.

CyberSecurity

UAC-0098, a threat actor that CERT-UA last month warned of
distributing tax-themed documents[9] carrying a Follina
exploit, has also been assessed to be a former initial access
broker with ties to the Conti group[10] in charge of
disseminating the IcedID banking trojan.

Other kinds of cyber activity include credential phishing
attacks mounted by an adversary referred to as COLDRIVER (aka
Callisto) aimed at government and defense officials, politicians,
NGOs and think tanks, and journalists.

These involve sending emails either directly, including the
phishing domain or containing links to documents hosted on Google
Drive and Microsoft OneDrive that, in turn, feature links to an
attacker-controlled website designed to steal passwords.

The latest developments[11] are yet another
indication of how Russian threat actors are exhibiting continued
signs of increasing sophistication in their attempts to target in
ways that highlight their evolving techniques.

References

  1. ^
    ongoing
    conflict
    (thehackernews.com)
  2. ^
    said
    (blog.google)
  3. ^
    onslaught
    (thehackernews.com)
  4. ^
    cyberattacks
    (thehackernews.com)
  5. ^
    form an
    IT Army
    (thehackernews.com)
  6. ^
    decoy
    app
    (www.virustotal.com)
  7. ^
    Azov
    Regiment
    (en.wikipedia.org)
  8. ^
    Follina
    vulnerability
    (thehackernews.com)
  9. ^
    distributing tax-themed documents
    (thehackernews.com)
  10. ^
    Conti
    group
    (thehackernews.com)
  11. ^
    latest
    developments
    (thehackernews.com)

Read more