Remove 11
Remove 2014 Remove Analysis Remove Military Remove Passwords
article thumbnail

Cyberwarfare: A deep dive into the latest Gamaredon Espionage Campaign

Security Affairs

Security experts from Yoroy-Cybaze ZLab have conducted a detailed analysis of an implant used by the Gamaredon APT group in a recent campaign. Gamaredon has been active since 2014, and during this time, the modus operandi has remained almost the same. Technical Analysis. Introduction. Cleaning the script we obtain: Figure 9.

article thumbnail

A month later Gamaredon is still active in Eastern Europe

Security Affairs

During recent times, Gamaredon is targeting the Ukrainian military and law enforcement sectors too, as officially stated by the CERT-UA. Technical Analysis. The infection chain is composed by different stages of password protected SFX (self extracting archive), each containing vbs or batch scripts. Malicious e-mail.

article thumbnail

APT28 and Upcoming Elections: evidence of possible interference

Security Affairs

Technical Analysis. Figure 2: password required to view and modify macros on document. The first peculiarity of the malicious document is the protected macro, in fact, when the user tries to read it immediately shows a message box asking for password. Further detail about AMSI have been described in a previous analysis report.