{"id":18715,"date":"2022-04-08T07:10:06","date_gmt":"2022-04-08T15:10:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/04\/08\/news-12448\/"},"modified":"2022-04-08T07:10:06","modified_gmt":"2022-04-08T15:10:06","slug":"news-12448","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/04\/08\/news-12448\/","title":{"rendered":"Successful operations against Russian Sandworm and Strontium groups targeting Ukraine revealed"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Fri, 08 Apr 2022 14:23:30 +0000<\/strong><\/p>\n<p>The US Department of Justice (DoJ) and Microsoft have taken the sting out of two operations believed to be controlled by the Russian Federation\u2019s Main Intelligence Directorate (GRU).<\/p>\n<p>On Wednesday, the DOJ <a href=\"https:\/\/www.justice.gov\/opa\/pr\/justice-department-announces-court-authorized-disruption-botnet-controlled-russian-federation\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">announced<\/a> that it had disrupted GRU\u2019s control over thousands of internet-connected firewall devices compromised by the Russian Sandworm group.<\/p>\n<p>One day later, Microsoft <a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2022\/04\/07\/cyberattacks-ukraine-strontium-russia\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">disclosed<\/a> information about the steps it took to disrupt cyberattacks it had seen targeting Ukraine. These attacks came from Strontium, another GRU-connected threat actor.<\/p>\n<p>In light of world news, it\u2019s important to note that the Sandworm group has always been known to target Ukrainian companies and government agencies. It has been held responsible for destroying entire Ukrainian networks, triggering blackouts by targeting electrical utilities, and releasing the <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/07\/keeping-up-with-the-petyas-demystifying-the-malware-family\/\">NotPetya<\/a> malware.<\/p>\n<h2>Shutdown operation<\/h2>\n<p>Although the DOJ announcement came just two days ago, the takedown operation actually occured a little earlier, in March 2022. And the story starts before that, with a joint <a href=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2022\/02\/cyclops-blink-malware-us-and-uk-authorities-issue-alert\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">advisory<\/a> released on 23 February by law enforcement agenices in the UK and the USA, about Cyclops Blink malware targeting network devices manufactured by WatchGuard and ASUS.<\/p>\n<p>Cyclops Blink surfaced as a replacement for <a href=\"https:\/\/en.wikipedia.org\/wiki\/VPNFilter\" target=\"_blank\" rel=\"noreferrer noopener\">VPNFilter<\/a> malware, which the DOJ disrupted with an operation in 2018. Both Cyclops Blink and VPNFilter are generally attributed to the Sandworm group, which has always been seen as a Russian state-sponsored actor.<\/p>\n<p>On the same day the advisory was released, WatchGuard published a <a href=\"https:\/\/detection.watchguard.com\" target=\"_blank\" rel=\"noreferrer noopener\">diagnosis and remediation plan<\/a>, and <a href=\"https:\/\/www.asus.com\/content\/ASUS-Product-Security-Advisory\/\" target=\"_blank\" rel=\"noreferrer noopener\">ASUS released its own guidance<\/a>. However, despite their advice, a botnet of &#8220;thousands of infected network hardware devices&#8221; running Cyclops Blink remained.<\/p>\n<p>In March the DOJ set out to fix that by targeting the Command and Control (C2) servers that orchestrated the botnet. The department says it did this by copying and removing Cyclops Blink malware from the C2 devices, and closing the external management ports that the Sandworm group used to access them.<\/p>\n<p>WatchGuard users that need the external management ports can reverse the closure through a device restart, but they are advised to follow this <a href=\"https:\/\/techsearch.watchguard.com\/KB?type=Article&amp;SFDCID=kA10H000000XeAtSAK&amp;lang=en_US\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">knowledge base article<\/a> about remote management.<\/p>\n<p>Although this stopped Sandworm from controlling the thousands of compromised WatchGuard and ASUS devices, it did not remove the malware from them. <\/p>\n<p>According to Assistant Attorney General Matthew G. Olsen of the Justice Department\u2019s National Security Division:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>This court-authorized removal of malware deployed by the Russian GRU demonstrates the department\u2019s commitment to disrupt nation-state hacking using all of the legal tools at our disposal. By working closely with WatchGuard and other government agencies in this country and the United Kingdom to analyze the malware and to develop detection and remediation tools, we are together showing the strength that public-private partnership brings to our country\u2019s cybersecurity.<\/p>\n<\/blockquote>\n<h2>Sinkhole<\/h2>\n<p>On the same day that the DOJ announced its Cyclops Blink takedown,&nbsp;Microsoft obtained a court order authorizing it to take control of seven internet domains being used by the Strontium group.<\/p>\n<p>The Strontium group, often referred to as <a href=\"https:\/\/blog.malwarebytes.com\/reports\/2021\/07\/beware-password-spraying-fancy-bears\/\">Fancy Bear<\/a> or APT28, is another GRU-connected threat actor known to target Ukrainian institutions, as well as government institutions and think-tanks in the United States and the European Union involved in foreign policy.<\/p>\n<p>After taking control of the domains, Microsoft re-directed them to a sinkhole under its control. A sinkhole is a way of redirecting malicious internet traffic so that it can be captured and analyzed by security professionals. Sinkholes are most often used to seize control of botnets.<\/p>\n<p>Microsoft describes this disruption as part of an ongoing long-term campaign, started in 2016, to take legal and technical action to seize infrastructure used by Strontium. The company has established a legal process that enables it to obtain rapid court decisions for this work. Prior to this week, it says it had taken action through this process 15 times to seize control of more than 100 Strontium controlled domains.<\/p>\n<h2>Good riddance<\/h2>\n<p>While these attacks are just a small part of the cyber-activity we are seeing in Ukraine, it does help to take out a few of these active major threats. <\/p>\n<p>The FBI is urging people to contact their local field office if they believe they have a compromised device. The agency says it &#8220;ontinues to conduct a thorough and methodical investigation into this cyber incident.&#8221;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/reports\/2022\/04\/successful-operations-against-russian-sandworm-and-strontium-groups-targeting-ukraine-revealed\/\">Successful operations against Russian Sandworm and Strontium groups targeting Ukraine revealed<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/reports\/2022\/04\/successful-operations-against-russian-sandworm-and-strontium-groups-targeting-ukraine-revealed\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Fri, 08 Apr 2022 14:23:30 +0000<\/strong><\/p>\n<p>Two announcements in two days detail operations against GRU-controlled infrastructure<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/reports\/2022\/04\/successful-operations-against-russian-sandworm-and-strontium-groups-targeting-ukraine-revealed\/\">Successful operations against Russian Sandworm and Strontium groups targeting Ukraine revealed<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[21392,11195,25116,116,25626,10516,12830,1804,20432,25634,22653,8642,25118],"class_list":["post-18715","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-asus","tag-botnets","tag-cyclops-blink","tag-doj","tag-gru","tag-microsoft","tag-notpetya","tag-reports","tag-sandworm","tag-sinkhole","tag-strontium","tag-ukraine","tag-watchguard"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18715","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18715"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18715\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18715"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18715"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18715"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}