Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Russia-linked cyber agent RomCom attacks Ukraine supporters during NATO 2023 summit

Using sophisticated spear-phishing tactics, RomCom distributed targeted remote access trojan to Vilnius, Lithuania summit delegates

The Russia-linked cyber group, RomCom, has reportedly targeted supporters of Ukraine, including attendees of the NATO 2023 summit. They spread a malicious document via spear-phishing and exploited a Microsoft vulnerability for a remote code execution attack. BlackBerry's cybersecurity unit unveiled these activities.
This pill is also available in Italian language

Recently, a cyber operation orchestrated by a Russia-linked threat actor known as RomCom was identified. The main target of these operations are entities and individuals who support Ukraine, including participants of the NATO 2023 summit taking place on 11 and 12 July. This information was reported by BlackBerry's cybersecurity unit.

Tactics used and preliminary analysis

The NATO summit takes place in Vilnius, Lithuania, and on the agenda are discussions focused on the war in Ukraine, as well as new additions to the organisation, such as Sweden and Ukraine itself. RomCom used the event to create malicious documents likely intended for supporters of Ukraine. BlackBerry reports that RomCom apparently tested its deployment on June 22 and days before the command and control (C&C) domain used in the campaign went live.

Detailed description of the chain of infection

For the distribution of one of the malicious documents, the threat actor likely relied on spear-phishing, using an embedded RTF file and OLE objects to initiate an infection chain intended to gather system information and distribute the Access trojan remote (RAT) of RomCom. At one stage in the infection chain, a vulnerability in Microsoft's Support Diagnostic Tool (MSDT) - CVE-2022-30190, also known as Follina - for remote code execution (RCE) is exploited.

Conclusions of the analysis and notices to the authorities

According to BlackBerry, the C&C domains and victim IPs identified during this campaign were all accessed from a single server, which was observed connecting to RomCom's known infrastructure. Based on observed tactics, techniques, and procedures (TTPs), network infrastructure, code similarities, and other artifacts collected, BlackBerry believes threat actor RomCom - or members of RomCom - is behind the operation informatics. The company reported this campaign to relevant government agencies before making this information public.

Follow us on Facebook for more pills like this

07/11/2023 11:32

Marco Verro

Complementary pills

Growing threat: Russian cyber warfare operations in UkraineThe increase in Russian attacks highlighted in the report of the Ukrainian cyber defense organization

Last pills

Discovery of vulnerability in Secure Boot threatens device securityFlaw in the Secure Boot system requires urgent updates to prevent invisible intrusions

North korean cyberattacks and laptop farming: threats to smart workingAdapting to new digital threats of remote work to protect vital data and infrastructures

Intelligent chatbots and steganography: new threats to IT securityEmerging challenges for cybersecurity between AI, steganography, and behavioral analysis

Advanced cybersecurity for AI containers: challenges and technological solutionsChallenges and innovative solutions to ensure the security of containerized AI infrastructures