Attack
Attack
Attack
Incident
Title:
Introduction:
Incident Overview:
The threat actors, identified as APT28 or Fancy Bear, employed a phishing campaign to
deliver the MASEPIE malware.
The campaign targeted government entities, businesses, universities, research institutes,
and think tanks in Ukraine.
The phishing emails, urging recipients to click on a seemingly important document link,
redirected victims to malicious web resources.
These resources utilized JavaScript to deploy a Windows shortcut file (LNK), triggering
PowerShell commands that initiated the infection chain for the 'MASEPIE' malware.
Investigating the incident:
In the process of investigating the incidents, it was found that the mentioned links
redirect the victim to a web resource where, with the help of JavaScript and features of
the application protocol "search" ("ms-search") [1], a shortcut file is downloaded, the
opening of which leads to the launch A PowerShell command designed to download
from a remote (SMB) resource and run (open) a decoy document, as well as the Python
programming language interpreter and the Client.py file classified as MASEPIE.
Using MASEPIE, OPENSSH (for building a tunnel), STEELHOOK PowerShell scripts
(stealing data from Chrome/Edge Internet browsers), and the OCEANMAP backdoor are
loaded and launched on the computer.
In addition, IMPACKET, SMBEXEC, etc. are created on the computer within an hour from
the moment of the initial compromise, with the help of which network reconnaissance
and attempts at further horizontal movement are carried out.
At the same time, it is obvious that the malicious plan also involves taking measures to
develop a cyberattack on the entire information and communication system of the
organization.
Thus, the compromise of any computer can pose a threat to the entire network.
For reference:
OCEANMAP
MASEPIE
STEELHOOK
It is a PowerShell script that provides the theft of Internet browser data ("Login
Data", "Local State") and the DPAPI master key by sending them to the
management server using an HTTP POST request in base64-encoded form.
Tactics:
Phishing: The primary delivery method involved sending phishing emails with malicious
attachments disguised as legitimate documents.
Techniques:
1- Malware: The emails carried a novel malware strain called Masepie, written in Python,
capable of:
Uploading files.
Executing commands.
Deploying additional malware:
2- Open-source tools: After initial compromise, attackers used readily available tools like
Impacket and Smbexec for:
Reconnaissance.
Network exploitation.
Sub-techniques:
Social engineering: Phishing emails likely used tailored content and sender names to
appear trustworthy and entice victims to open attachments.
Obfuscation: Masepie malware reportedly employed techniques to evade detection by
security software.
Persistence: The attackers utilized Masepie to establish remote access, allowing them to
maintain long-term control over compromised systems.
Initial compromise: Lure victims into downloading and opening malware through
phishing.
Lateral movement: Use Masepie to upload additional malware and tools for deeper
network infiltration.
Data exfiltration: Steal sensitive information using tools like Steelhook.
Command and control: Establish persistent access with Oceanmap for ongoing control
and potential future operations.
Research identified incident response best practices from frameworks such as NIST and
ISO/IEC 27035.
While CERT-UA demonstrated promptness, there are areas where alignment with best
practices can be enhanced, particularly in proactive measures for preventing initial
compromises.
1. Strengthen proactive measures to prevent phishing attacks, possibly through user education
and advanced email filtering.
2. Enhance detection capabilities, including the use of threat intelligence feeds.
3. Improve containment strategies to mitigate lateral movement swiftly.
4. Enhance recovery processes for quicker system restoration.
5. Conduct regular simulations and exercises to refine incident response procedures.
Conclusion:
The incident underscores the importance of a robust incident response plan.
While CERT-UA exhibited effectiveness, continuous refinement is crucial to stay ahead of evolving
threats.
The proposed recommendations aim to fortify Ukraine's cybersecurity posture against sophisticated
threat actors.
References:
https://www.bleepingcomputer.com/news/security/russian-military-hackers-target-ukraine-
with-new-masepie-malware/
https://www.broadcom.com/support/security-center/protection-bulletin/apt28-group-
targets-ukraine-with-new-masepie-malware
https://cert.gov.ua/article/6276894