therecord.media Open in urlscan Pro
2606:4700:4400::6812:20b5  Public Scan

URL: https://therecord.media/ukraine-battlefield-tablets-malware-sandworm-gru-five-eyes-report
Submission: On September 01 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

<form><span class="text-black text-sm icon-search"></span><input type="text" name="s" placeholder="Search…" value=""><button type="submit">Go</button></form>

Text Content

This website stores cookies on your computer. These cookies are used to improve
your website experience and provide more personalized services to you, both on
this website and through other media. To find out more about the cookies we use,
see our Privacy Policy.

Accept


 * Leadership
 * Cybercrime
 * Nation-state
 * People
 * Technology

 * Mobile App
 * About
 * Podcast
 * Contact

Go


SUBSCRIBE TO THE RECORD

Subscribe

A Ukrainian fighter uses a tablet computer. Image: IMAGE: Army SOS / Facebook
Alexander MartinAugust 31st, 2023
 * Nation-state
 * Malware
 * News

 * 
 * 
 * 
 * 
 * 

Get more insights with the
Recorded Future
Intelligence Cloud.
Learn more.


GRU HACKING TOOLS TARGETING UKRAINIAN MILITARY DEVICES DETAILED BY FIVE EYES

Western intelligence and cybersecurity agencies published a report on Thursday
highlighting a collection of hacking tools being used by Russia’s military
intelligence service against Android devices operated by the Ukrainian Armed
Forces.

The report, published by Britain’s National Cyber Security Centre (NCSC) —
alongside agencies in the United States, Canada, Australia and New Zealand, who
form the Five Eyes intelligence alliance — names the malware “Infamous Chisel.”

It details how the malware enables the GRU to acquire unauthorized access to
compromised devices before scanning files, monitoring traffic and periodically
stealing sensitive information.

“Infamous Chisel is a collection of components which enable persistent access to
an infected Android device over the Tor network, and which periodically collates
and exfiltrates victim information from compromised devices,” explains the
report, referencing the technology that anonymizes internet traffic.

Read More: Gamaredon hackers target Ukrainian military orgs amid
counteroffensive efforts

The GRU’s hacking campaign was first publicly disclosed by Ukraine’s security
service (SBU) earlier this month, when the agency announced it had prevented
attempts by Russian state-controlled hackers to break into Ukraine’s battlefield
management system.

According to the SBU, the campaign was conducted by the hacking group known as
Sandworm and targeted Android tablets the Ukrainian military uses to plan and
execute combat missions, with the intention of gaining access to other connected
devices.

The components making up the malware “are low to medium sophistication and
appear to have been developed with little regard to defence evasion or
concealment of malicious activity,” according to the new report.

They lack “basic obfuscation or stealth techniques to disguise activity”
according to the NCSC, although the agency says that the hackers behind the
malware may have assumed this was unnecessary as many Android devices don’t have
a host-based detection system.

The report does credit the malware for two interesting techniques, including how
it maintains persistence by replacing the legitimate netd system binary with a
malicious version, and providing the hackers with remote access to the devices
“by configuring and executing Tor with a hidden service which forwards to a
modified Dropbear binary providing a SSH connection.” Dropbear is legitimate
open source Unix-based software for Secure Shell (SSH) servers, which encrypt
network traffic.

“These techniques require a good level of C++ knowledge to make the alterations
and an awareness of Linux authentication and boot mechanisms,” states the
report.

Sandworm, which was also behind attacks on Ukraine’s power grid in 2015, as well
as the catastrophic NotPetya malware which initially targeted Ukraine before
spreading out of control, has previously been attributed to the GRU’s Main
Centre for Special Technologies, GTsST.

Paul Chichester, the NCSC’s director of operations, said: “The exposure of this
malicious campaign against Ukrainian military targets illustrates how Russia’s
illegal war in Ukraine continues to play out in cyberspace.

“Our new report shares expert analysis of how this new malware operates and is
the latest example of our work with allies in support of Ukraine’s staunch
defence. The UK is committed to calling out Russian cyber aggression and we will
continue to do so.”

The agency warns that despite the lack of concealment functions, the malware
components pose “a serious threat because of the impact of the information they
can collect.”

 * 
 * 
 * 
 * 
 * 

Tags
 * Russia
 * Ukraine
 * UK NCSC
 * United States
 * New Zealand
 * Australia
 * Canada
 * Five Eyes
 * hardware
 * GRU
 * Sandworm


ALEXANDER MARTIN



Alexander Martin is the UK Editor for Recorded Future News. He was previously a
technology reporter for Sky News and is also a fellow at the European Cyber
Conflict Research Initiative.

Previous articleNext article
Internet access in Gabon restored after post-election coup
NSA insider to succeed George Barnes as agency’s deputy director


BRIEFS

 * Paramount confirms data breach after cyberattackAugust 31st, 2023
 * NSA insider to succeed George Barnes as agency’s deputy directorAugust 31st,
   2023
 * Internet access in Gabon restored after post-election coupAugust 30th, 2023
 * China-linked hackers spy on Android users through fake messenger appsAugust
   30th, 2023
 * Network technology giant Juniper warns users about denial-of-service
   bugsAugust 30th, 2023
 * Netgear releases patches for two high-severity vulnerabilitiesAugust 30th,
   2023
 * Japan’s cybersecurity agency breached by suspected Chinese hackers:
   reportAugust 29th, 2023
 * US food delivery service PurFoods discloses data breachAugust 28th, 2023
 * ‘Incredible concern and anger’ among Metropolitan Police after hackers breach
   dataAugust 28th, 2023


EMPIRE DRAGON ACCELERATES COVERT INFORMATION OPERATIONS, CONVERGES WITH RUSSIAN
NARRATIVES


Empire Dragon Accelerates Covert Information Operations, Converges with Russian
Narratives


CONVERGING NARRATIVES ON HAWAII WILDFIRES ADVANCE DIFFERENT INFLUENCERS’
OBJECTIVES


Converging Narratives on Hawaii Wildfires Advance Different Influencers’
Objectives


MALIGN NARRATIVES OPPOSE “THE VOICE” AHEAD OF AUSTRALIA’S REFERENDUM


Malign Narratives Oppose “the Voice” Ahead of Australia’s Referendum


H1 2023: RANSOMWARE'S PIVOT TO LINUX AND VULNERABLE DRIVERS


H1 2023: Ransomware's Pivot to Linux and Vulnerable Drivers


THREAT ACTORS LEVERAGE INTERNET SERVICES TO ENHANCE DATA THEFT AND WEAKEN
SECURITY DEFENSES


Threat Actors Leverage Internet Services to Enhance Data Theft and Weaken
Security Defenses
 * 
 * 
 * 
 * 

 * Privacy Policy

© Copyright 2023 | The Record from Recorded Future News