HOT
tulanefml
No Result
View All Result
tulanefml
No Result
View All Result
Advertisement Banner
Home Technology

Microsoft links Russia’s military to cyberattacks in Poland and Ukraine

tulanefml by tulanefml
November 18, 2022
in Technology
386 12
0
548
SHARES
2.5k
VIEWS
Share on FacebookShare on Twitter


Getty Images

Microsoft on Thursday fingered Russia’s military intelligence arm as the likely culprit behind ransomware attacks last month that targeted Polish and Ukrainian transportation and logistics organizations.

If the assessment by members of the Microsoft Security Threat Intelligence Center (MSTIC) is correct, it could be cause for concern for the US government and its European counterparts. Poland is a member of NATO and a staunch supporter of Ukraine in its bid to stave off an unprovoked Russian invasion. The hacking group the software company linked to the cyberattacks—known as Sandworm in wider research circles and Iridium in Redmond, Washington—is one of the world’s most talented and destructive and is widely believed to be backed by Russia’s GRU military intelligence agency.

Sandworm has been definitively linked to the NotPetya wiper attacks of 2017, a global outbreak that a White House assessment said caused $10 billion in damages, making it the most costly hack in history. Sandworm has also been definitively tied to hacks on Ukraine’s power grid that caused widespread outages during the coldest months of 2016 and again in 2017.

Enter Prestige

Last month, Microsoft said that Poland and Ukraine transportation and logistics organizations had been the target of cyberattacks that used never-before-seen ransomware that announced itself as Prestige. The threat actors, Microsoft said, had already gained control over the victim networks. Then in a single hour on October 11, the hackers deployed Prestige across all its victims.

Once in place, the ransomware traversed all files on the infected computer’s system and encrypted the contents of files that ended in .txt, .png, gpg, and more than 200 other extensions. Prestige then appended the extension .enc to the existing extension of the file. Microsoft attributed the attack to an unknown threat group it dubbed DEV-0960.

On Thursday, Microsoft updated the report to say that based on forensic artifacts and overlaps in victimology, tradecraft, capabilities, and infrastructure, researchers determined DEV-0960 was very likely Iridium.

Advertisement

“The Prestige campaign may highlight a measured shift in Iridium’s destructive attack calculus, signaling increased risk to organizations directly supplying or transporting humanitarian or military assistance to Ukraine,” MSTIC members wrote. “More broadly, it may represent an increased risk to organizations in Eastern Europe that may be considered by the Russian state to be providing support relating to the war.”

Thursday’s update went on to say that the Prestige campaign is distinct from destructive attacks in the past two weeks that used malware tracked as AprilAxe (ArguePatch)/CaddyWiper or Foxblade (HermeticWiper) to target multiple critical infrastructures in Ukraine. While the researchers said they still don’t know what threat group is behind those acts, they now have enough evidence to finger Iridium as the group behind the Prestige attacks. Microsoft is in the process of notifying customers who have been “impacted by Iridium but not yet ransomed,” they wrote.

Underscoring the sophistication of the attacks, Iridium members used multiple methods for deploying Prestige on the targeted networks. They included:

Windows scheduled tasks

Microsoft

encoded PowerShell commands, and

Microsoft

Default Domain Group Policy Objects

Microsoft

“Most ransomware operators develop a preferred set of tradecraft for their payload deployment and execution, and this tradecraft tends to be consistent across victims, unless a security configuration prevents their preferred method,” MSTIC members explained. “For this Iridium activity, the methods used to deploy the ransomware varied across the victim environments, but it does not appear to be due to security configurations preventing the attacker from using the same techniques. This is especially notable as the ransomware deployments all occurred within one hour.”

The post contains technical indicators that can help people figure out if they have been targeted.



Source_link

Advertisement Banner
tulanefml

tulanefml

Trending

Sports

Messi has doubts about playing 2026 World Cup at age 39

3 mins ago
Science

What Makes Saturn’s Moon Mimas Look Like The ‘Death Star’ Is New Evidence For An Underground Ocean, Say Shocked Scientists

4 mins ago
Entairtainment

15 Celebs Who Found Success Young And 15 Who Were Older

8 mins ago
Business

Apple reports first decline in revenue in three-and-a-half years

9 mins ago
Sports

Wallabies legend Matt Giteau announces retirement

13 mins ago
tulanefml

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

Follow Us

Recent News

Messi has doubts about playing 2026 World Cup at age 39

February 3, 2023

What Makes Saturn’s Moon Mimas Look Like The ‘Death Star’ Is New Evidence For An Underground Ocean, Say Shocked Scientists

February 3, 2023

Categories

  • Animals
  • Business
  • Buzz
  • Celebs
  • Entairtainment
  • Health
  • Life
  • Science
  • Sports
  • Tech
  • Technology
  • Video

Tags

Art Entertainment Funny Health News Split Post Viral
  • About
  • Advertise
  • Privacy & Policy
  • Contact Us

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
    • Home – Layout 4
    • Home – Layout 5
  • Buzz
  • Animals
  • Celebs
  • Life
  • Tech
  • Video
  • More
    • About
    • Contact Us

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In