Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Secret Blizzard deploys Kazuar backdoor in Ukraine using Amadey malware as a service
Global Security

Secret Blizzard deploys Kazuar backdoor in Ukraine using Amadey malware as a service

AdminBy AdminDecember 11, 2024No Comments4 Mins Read
Amadey Malware-as-a-Service
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


December 11, 2024Ravi LakshmananMalware / cyber espionage

Amadey malware as a service

The Russian national-statesman is tracked as Secret blizzard was seen using malware associated with other threat actors to deploy a known backdoor called Kazuar on target devices located in Ukraine.

The new findings came from Microsoft’s threat intelligence team, which said that between March and April 2024. observed how an adversary used the Amadey bot malware to download custom malware onto “handpicked” systems linked to the Ukrainian military.

The activity is believed to be the second since 2022, when Secret Blizzard, also known as Turla, seized on a cybercrime campaign to distribute its own tools in Ukraine.

“Commanding access to other threat actors underscores Secret Blizzard’s approach to diversifying its attack vectors,” the company said in a statement. the report shared with The Hacker News.

Some other well-known techniques used by hackers include man-in-the-middle (AitM) companies, strategic web trade-offs (aka watering hole attacks) and phishing.

Cyber ​​security

Secret Blizzard has experience targeting various sectors to facilitate long-term covert access for intelligence gathering, but their primary focus is on foreign ministries, embassies, government agencies, ministries of defense and defense companies around the world.

The latest report comes a week after the tech giant, along with Lumen Technologies’ Black Lotus Labs, revealed Turla’s capture of 33 command and control (C2) servers of a Pakistani hacker group called Storm-0156 to conduct its own operations.

Attacks on Ukrainian structures involve the command Amadey boots to deploy a backdoor known as Taudigwhich is then used to install the updated version Causedwhich was documented by Division 42 of Palo Alto Networks in November 2023.

Amadeus-related cybercriminal activity is frequent includes the execution of the XMRig cryptocurrency miner is tracked by Microsoft under the alias Storm-1919.

Amadey malware as a service

Secret Blizzard is believed to have either used Amadey malware-as-a-service (MaaS) or stealthily accessed Amadey command panels (C2) to download a PowerShell program to target devices. The dropper contains a Base64-encoded Amadey payload, to which is added a code segment that addresses the Turla C2 server.

“The need to encode the PowerShell dropper with a separate C2 URL controlled by Secret Blizzard may indicate that Secret Blizzard did not directly control the C2 engine used by the Amadey bot,” Microsoft said.

The next step involves downloading a special intelligence tool to gather details about the victim device and possibly check if Microsoft Defender has been enabled, ultimately allowing the threat actor to focus on systems of further interest.

At this stage, the attack proceeds to deploy a PowerShell dropper that contains the Tavdig backdoor and a legitimate Symantec binary susceptible to DLL sideloading. Tavdig, in turn, is used to conduct additional reconnaissance and launch KazuarV2.

Microsoft said it also discovered a threat that repurposed a PowerShell backdoor linked to another Russian hacking group called Flying yeti (aka Storm-1837 and UAC-0149) to deploy a PowerShell program that embeds Tavdig.

Cyber ​​security

The tech giant noted that the investigation into how Secret Blizzard gained control of the Storm-1837 backdoor or Amadey bots to download its own tools is ongoing.

Needless to say, the findings once again highlight the threat actor’s repeated pursuit of entrenchment with other parties by gaining or stealing access to conduct espionage campaigns in such a way as to conceal their presence.

“It’s not uncommon for actors to use the same tactics or tools, although we rarely see evidence of them hacking and exploiting the infrastructure of other actors,” Sherrod DeGrippo, director of threat intelligence strategy at Microsoft, told The Hacker News.

“Most state-sponsored threat actors have operational objectives that rely on specialized or carefully compromised infrastructure to maintain the integrity of their operations. This is a potentially effective obfuscation technique to frustrate threat intelligence analysts and make it difficult to attribute the correct threat actor.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.