Russia-linked APT28 group hacked into Roundcube email servers belonging to multiple Ukrainian organizations.
A joint investigation conducted by Ukraine’s Computer Emergency Response Team (CERT-UA) and Recorded Future revealed that the Russia-linked APT28 group hacked into Roundcube email servers belonging to multiple Ukrainian organizations.
The APT28 group (aka Fancy Bear, Pawn Storm, Sofacy Group, Sednit, BlueDelta, and STRONTIUM) has been active since at least 2007 and it has targeted governments, militaries, and security organizations worldwide. The group was involved also in the string of attacks that targeted 2016 Presidential election.
The group operates out of military unity 26165 of the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS).
Most of the APT28s’ campaigns leveraged spear-phishing and malware-based attacks.
In the recent campaign, the threat actors used news about the ongoing conflict between Russia and Ukraine as bait. The cyber spies sent crafted emails to the target organizations, upon opening the messages Roundcube Webmail vulnerabilities (CVE-2020-35730, CVE-2020-12641, and CVE-2021-44026) were triggered allowing them to hack vulnerable servers.
BlueDelta Outlook and Roundcube spearphishing infection chain overlap (source Iksikt)The state-sponsored hackers were able to deploy scripts to redirect the incoming emails to an email address under their control and steal Roundcube data by exploiting an SQLi issue tracked as CVE-2021-44026.
One of the scripts, the “c.js”, was containing an exploit for the CVE-2020-12641 vulnerability.
According to CERT-UA, this campaign targeted more than 40 Ukrainian organizations, including government entities.
The Recorded Future’s Insikt Group believes that the campaign has been active since November 2021.
“Based on the targeting and geopolitical backdrop and the group’s organizational links, the highlighted BlueDelta activity was likely intended to enable military intelligence-gathering to support Russia’s invasion of Ukraine. Infrastructure related to BlueDelta activity has likely been operational since at least November 2021.” states Recorded Future. “This infrastructure was identified by Insikt Group via Recorded Future® Malicious Traffic Analysis (MTA) which surfaced multiple Ukrainian entities, including government institutions, communicating with this BlueDelta infrastructure. Organizations within Ukraine are likely the primary targets of this activity.”
According to Recorded Future researchers, this campaign overlaps with previous APT28 attacks exploiting Microsoft Outlook zero-day tracked as CVE-2023-23397 and aimed at European organizations.
Both reports from CERT-UA and Insikt includes Indicators of Compromise (IoCs) for this campaign.
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, APT28)
The post Russia-linked APT28 hacked Roundcube email servers of Ukrainian entities appeared first on Security Affairs.