APT28, Turla Nation-State Groups Deployed Multiple 0Days in Recent Attacks

  /     /     /  
Publicated : 22/11/2024   Category : security


APT28, Turla Nation-State Groups Deployed Multiple 0Days in Recent Attacks


Attack campaigns by APT28, Turla, and an unidentified group showcase easy availability of zero-days.



Threat actors rarely ever need zero-day flaws to breach enterprise networks. But there appears to be a plentiful supply of such vulnerabilities for those who do.
A flurry of recent exploit activity targeting government, military, and banking entities mostly in Europe and the Middle East is one example.
Security vendors
ESET
and
FireEye
this week issued separate advisories on cyberattacks involving the use of three Microsoft zero-day flaws. Two of them involved the Encapsulated PostScript (EPS) function in Microsoft Office, while the third was a privilege escalation flaw in Windows.
Microsoft addressed all three issues in its monthly security update for May this week.
In its advisory, FireEye said it had seen the three flaws being exploited in attacks by an unidentified group and also by APT28 and Turla, two previously known Russian cyber espionage groups. The unknown group appeared to be motivated by financial gain and was focused mainly on regional and global banks operating in the Middle East. The APT28 and Turla attacks were likely targeted at extracting geopolitical intelligence from targets in Europe.
The attacks by Turla and the unknown group involved the use of
CVE-2017-0261
, a remote code execution flaw that allowed attackers to gain administrative access on vulnerable systems. The EPS vulnerability, according to Microsoft, could be exploited by getting users to open an Office file with a malformed image or by getting them to insert a malformed image into an Office file.
The APT28 groups attacks meanwhile exploited two zero-day flaws;
CVE-2017-0262
, a remote code execution vulnerability in EPS handling that was nearly identical to the other EPS zero-day; and
CVE-2017-0263
, an escalation of privilege flaw in Windows.
APT28s objective in using the two zero-day flaws was to drop Seduploader, a reconnaissance tool that the group is well known for using to steal confidential information from targets, ESET said in its blog.
These vulnerabilities show that financially motivated actors have access to some of the most sophisticated tools that are sometimes thought to be the sole purview of nation states, says Benjamin Read, a security analyst at FireEye. The use of multiple zero-days by Russian actors underscores the technically sophisticated threat from cyber espionage groups in that country, he says.
Marc-Etienne Leveille, malware researcher at ESET, says that since 2015, the company has observed the APT28 group use at least 12 different zero-days exploits—six in 2015, four in 2016, and two so far in 2017.
The group, which is also known as Sofacy, Fancy Bear, and Sednit, has been active for more than 10 years, so the actual number of zero-days it has used in that period is likely to be much higher. APT28 is believed to have been involved in the attacks on the Democratic National Committee (DNC) and has been cited as proof of Russian involvement in the attack. Most recently, the threat group is
believed
to have been behind an attempt to gain access to the email accounts of those involved in just elected French President Emmanuel Macrons campaign.
Because of the amount of zero-days theyve used in the past few years, we can assume that they either have very skilled people or enough financial resources to maintain this trend, Leveille says.
ESET does not have information on pricing in the Dark Market for zero-day flaws such as the two used by APT28 in its most recently observed campaigns. But based on prices from zero-day acquisition platform
Zerodium
, it is likely that the two exploits combined could cost up to $70,000. Finding or writing new reliable zero-day exploits is not an easy task, he says.
Related Content:
30% of Q4 Malware was New or Zero-Day
10 Free or Low-Cost Security Tools
Dark Reading Radio: Bug Bounties & The Zero-Day Trade
What To Do When All Malware Is Zero-Da
y
 

Last News

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security

▸ Website hacks happened during World Cup final. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
APT28, Turla Nation-State Groups Deployed Multiple 0Days in Recent Attacks