Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Russian hackers exploit email and VPN to spy on Ukraine’s logistics
Global Security

Russian hackers exploit email and VPN to spy on Ukraine’s logistics

AdminBy AdminMay 21, 2025No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Russian Cyber ​​-ules were attributed With a state -owned company aimed at Western logistics structures and technology companies since 2022.

The activity was evaluated by the APT28 orchestra (aka Bluedelta, Fancy Bear or Forest Blizzard), which is connected with the headmaster of the Russian General Staff (GR), the 85th Main Service, 26165 military unit.

The goals of the company include companies involved in coordination, transportation and providing foreign aid to Ukraine, according to joint advisory, published agencies from Australia, Canada, Czech Republic, Estonia, France, Germany, the Netherlands, Poland, the United Kingdom and the United States.

“This cyber-spying company focused on logistics structures and technology companies uses a combination of previously disclosed TTPS and probably – Note.

The warning takes place a few weeks after a foreign ministry of France accused APT28, which establish cyber -post on a dozen formations, including ministries, defense firms, research structures and analytical centers since 2021 in an attempt to destabilize the nation.

Then last week Eset removed the wraps from the company called Operation round press This states that they have been ongoing since 2023, using script vulnerabilities in various web substations, such as RoundCube, Horde, Mdaemon and Zimbra to nominate state structures and defense companies in Eastern Europe, as well as governments in Africa, Europe and South America.

Cybersecurity

According to the latest advisory, cyberattacks organized by the APT28, provides a combination of password spraying, spears and modifications to Microsoft Exchange mailbox for espionage purposes.

The main goals of the campaign include organizations in NATO and Ukraine, which cover protection, transport, maritime, air traffic and IT -vertical. According to estimates, no less than dozen formations in Bulgaria, Czech Republic, France, Germany, Greece, Italy, Moldova, the Netherlands, Poland, Romania, Slovakia, Ukraine and the USA.

It is said that the original access to the target networks was contributed to the use of seven different methods –

  • Rough attacks to guess the powers
  • Attacks with spear-mi-fining to collect credentials using fake entry pages providing themselves for government agencies and e-mail suppliers Western Cloud
  • Attacks for spear-fining for delivering malware
  • Exploitation of the vulnerability of Outlook NTLM (Cve-2023-2397)
  • Exploitation of RoundCube’s vulnerabilities (Cve-2020-12641, Cve-2020-35730, Cve-2011-44026)
  • Exploitation of the infrastructure that stands on the Internet
  • Exploitation of Winrar’s vulnerability (Cve-2013-38831)

Once the actors of the 26165 unit are fixed using one of the above methods, the attacks go to the stage after operation, which includes exploration to identify additional goals in key positions, people responsible for coordinating transport, and other companies that cooperate with the subject.

The attackers were also observed using tools such as PSEXEC, PSEXEC, and the Desktop (RDP) for lateral motion, as well as Sertipy and Adexplorer.exe to highlight the information from Active Directory.

“Actors take measures to search and operation of the Office 365 users lists and created a stable email collection,” the agencies said. “Actors used Manipulation permit on the mailbox Create a steady e -mail collection in compromised logistics organizations. “

Another notable feature of invasion is the use of malware as Vote and MasepieTo set perseverance on compromised hosts and harvest. There is no evidence that such options are malware love Oceanmap and steelok were used for the direct purpose of logistics or IT scectors.

Cybersecurity

During the expansion of data, the threat subjects relied on different methods based on the victim’s environment, often using PowerShell commands to create the archives of Zip to download the collected data into its own infrastructure or using exchange web -service (EWS) and Internet Internet access protocol.

“As the Russian military forces did not reach their military goals, and Western countries assisted in support of Ukraine’s territorial defense, 26165 division expanded the orientation to logistics organizations and technology companies involved in assistance,” the agencies said. “These actors are also aimed at Internet cameras on Ukrainian border crossings for monitoring and tracking assistance.”

Disclosure occurs when catao network showed that suspected threats are used by object facilities Tigris, Oracle Cloud Infrastructure (OCI) and storage of scaleway facilities to place counterfeit Recaptcha pages that use the use Clickfix-Parbed in the style of fooling users in boot Theft of a lama.

“The latest company that uses object storage Tigris, storage of OCI facilities and storage of SCALEway objects, relies on earlier methods, introducing new delivery mechanisms aimed at evading and orientation to technically experienced users,” Guyl Dominga, Guy Vael and Timer Agaev. – Note.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025

Researchers in detail in detail decisively developing tactics as it expands its geographical volume

June 5, 2025

Iran related

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.