Russias Fancy Bear APT Group Gets More Dangerous

  /     /     /  
Publicated : 22/11/2024   Category : security


Russias Fancy Bear APT Group Gets More Dangerous


Encryption and code refreshes to groups main attack tool have made it stealthier and harder to stop, ESET says.



Fancy Bear, the Russian advanced persistent threat group associated with the infamous intrusion at the Democratic National Committee last year among numerous other break-ins, may have become just a little bit more dangerous.
The group — also referred to as Sednit, APT28, and Sofacy — appears to have recently refurbished its primary malware tool, Xagent, and added new functionality to make it decidedly stealthier and harder to stop, security vendor ESET said in an
advisory
Thursday.
The modular backdoor has been a central component of Fancy Bears campaigns for several years. Initial versions of the tool were designed to break into Windows and Linux systems. But it has been updated in the past two years to include support for iOS, Android, and, since the beginning of this year, OS X.
The fourth and latest version of the malware comes with new techniques for obfuscating strings and all run-time type information. The techniques, according to ESET, have significantly improved the malwares encryption abilities. The Fancy Bear/Sednit group also has upgraded some of the code used for command and control (C&C) purposes and added a new domain generation algorithm (DGA) feature for quickly creating fallback C&C domains.
The previous version of Xagent modular backdoor was already very complex, but the new version is even more, says Thomas Dupuy, malware researcher at ESET
.
ESET is still completing its analysis of the new features in Xagent, but the new encryption algorithm and DGA implementation are significant, he says. The former makes the malware analysis more difficult while the latter makes domain takeover more challenging, as there are more domains to take down or seize, Dupuy says.
In addition to the encryption and DGA, Fancy Bear also has some internal improvements such as new commands that can be used for hiding malware configuration data and other data on a target system. The authors of the malware have redesigned and refactored some existing components so it has become harder to recognize previously discovered mechanisms. Xagent also now has the ability to take screenshots of the targets desktop.
The new version of Xagent has improved Fancy Bear/Sednits ability to stay under the radar, Dupuy says. Some of these changes are definitely related to the fact that they are trying to avoid too much attention while others are to make security researchers jobs harder, he notes.
Otherwise, Fancy Bear/Sednits tactics and techniques have remained largely unchanged. The group still relies heavily on the use of very cleverly crafted phishing emails to try and get targets to click on links that lead to malicious domains or to download malware.
It has largely stopped using Sedkit, an exploit kit used in numerous previous attacks, and has increasingly begun using a platform called DealersChoice to initially breach systems.
DealersChoice, according to ESET, can generate documents with embedded Adobe Flash Player exploits. One version of the platform is designed to first check which version of Flash Player a target system might be running and then exploit it. Another variant first contacts a C&C server and then deliver a selected Flash exploit.
Like the previous Sedkit exploit kit, DealersChoice is designed to scour international news stories and include references to relevant ones in the malicious emails it generates and sends to potential targets.
From a targeting standpoint, Fancy Bear/Sednit still appears to be focused on the same objectives, Dupuy says. Its still attacking government departments and embassies all over the world, with a particular interest in Eastern Europe, where the group regularly targets individuals and organizations involved in geopolitics.
Generally, Fancy Bears tactics, techniques, and procedures have not changed a whole lot, Dupuy says. But the group has shown a tendency to vary its infection techniques, he adds. The new version is more complex to analyze, which slows down ability to defend against the malware, he notes.
Related content:
FBI, DHS Report Implicates Cozy Bear, Fancy Bear In Election-Related Hacks
APT28 Uses EternalBlue to Spy on Hotel Wifi Networks
OceanLotus APT Group Unfolds New Tactic in Cyber Espionage Campaign
8 Active APT Groups To Watch

Last News

▸ New threat discovered: Mobile phone ownership compromised. ◂
Discovered: 23/12/2024
Category: security

▸ Some DLP Products Vulnerable to Security Holes ◂
Discovered: 23/12/2024
Category: security

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Russias Fancy Bear APT Group Gets More Dangerous