therecord.media Open in urlscan Pro
2606:4700:4400::6812:2a1e  Public Scan

URL: https://therecord.media/smokeloader-malware-russia-ukraine-financial-institutions
Submission: On December 11 via manual from US — Scanned from US

Form analysis 1 forms found in the DOM

<form data-hs-cf-bound="true"><span class="text-black text-sm icon-search"></span><input name="s" placeholder="Search…" type="text" value=""><button type="submit">Go</button></form>

Text Content

This website stores cookies on your computer. These cookies are used to improve
your website experience and provide more personalized services to you, both on
this website and through other media. To find out more about the cookies we use,
see our Privacy Policy.

Accept


 * Leadership

 * Cybercrime

 * Nation-state

 * Elections

 * Technology

 * Cyber Daily®

 * Click Here Podcast

Go
Subscribe to The Record

✉️ Free Newsletter

Daryna Antoniuk
March 20th, 2024
 * Cybercrime
 * News
 * Malware

 * 
 * 
 * 
 * 
 * 
 * 

Get more insights with the
Recorded Future
Intelligence Cloud.
Learn more.


RUSSIA-LINKED HACKERS USE SMOKELOADER MALWARE TO STEAL FUNDS FROM UKRAINIAN
ENTERPRISES

Smokeloader malware used by Russia-linked cybercriminals remains one of the
major tools for financial hacks in Ukraine, according to a recent report.

Between May and November 2023, researchers identified 23 Smokeloader campaigns
aimed at various targets in Ukraine, including financial institutions and
government organizations. The hackers were most active in August and October,
launching 198 and 174 phishing incidents respectively, according to a report
published Tuesday by Ukraine’s major state cyber agency — SSSCIP — in
collaboration with cybersecurity firm Palo Alto Networks.

Ukraine’s computer emergency response team, CERT-UA, tracks the group behind
Smokeloader as UAC-0006. The group uses the malicious tool to download other
malware in attempts to steal funds from Ukrainian enterprises.

According to CERT-UA, the group behind the malware attempted to steal tens of
millions of hryvnias ($1 = about 40 Ukrainian hryvnias) from August to September
2023.

The hackers primarily distributed the malware through phishing campaigns, often
using previously compromised email addresses. This tactic allowed them “to
exploit trusted corporate email accounts to heighten the chances of tricking the
target into falling for the phishing attempts,” according to researchers.

Some of the email subjects and file names contained spelling mistakes or were
composed of a mix of Ukrainian and Russian words.

In their recent campaign in October, the hackers used Smokeloader to attack
state, private, and financial institutions, with a particular focus on
accounting departments.

The hackers concealed Smokeloader under layers of seemingly harmless financial
documents. Most of these files were legitimate and were stolen from
organizations that had been previously compromised.

Smokeloader uses various evasion strategies to slip through security measures
undetected. After finally gaining access to the system, it can extract crucial
device information, including operating system details and location data.

Researchers said that although Ukraine has seen a rise in Smokeloader attacks,
this malware “remains a global threat and continues to be seen in multiple
campaigns targeting other countries.”

Threat actors have been advertising Smokeloader on underground forums since
2011. The researchers did not attribute this malware to a specific hacker group,
but they suggest potential connections to Russian cybercriminal operations. 

Over the years, Smokeloader has been updated and evolved to keep pace with
techniques to avoid detection by security vendors.

Since the malware first appeared, various groups have used it against different
industries and organizations across the globe. These activities range from
recent targeted cyberattacks in Ukraine to criminal activity resulting in Phobos
ransomware infections, researchers said.

Phobos is a ransomware-as-a-service strain that allows cybercriminals to gain
access to login credentials through phishing campaigns or brute force attacks,
in which attackers attempt to access a targeted account by trying different
combinations of usernames and passwords until they find the correct one.

In February, hackers used a Phobos variant to target an IT platform serving
hospitals in Romania. As a result of the attack, data from nearly 25 hospitals
was encrypted, and approximately 75 hospitals were disconnected from the
internet.

 * 
 * 
 * 
 * 
 * 
 * 

Tags
 * Smokeloader
 * Russia
 * Ukraine
 * Finance
 * malware
 * Phobos

Previous articleNext article
Ukrainian police detain cybercriminals trying to sell millions of stolen email
and Instagram accounts
International freight tech firm isolates Canada operations after cyberattack

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about
cybersecurity startups, cyberattacks in Eastern Europe and the state of the
cyberwar between Ukraine and Russia. She previously was a tech reporter for
Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent
and The Kyiv Post.




BRIEFS

 * French internet operator fined $53 million for unsolicited ads and tracking
   users without consentDecember 10th, 2024
 * Wyden seeks stricter telecom cyber standards following Salt Typhoon
   breachDecember 10th, 2024
 * Homeland Security veteran to be interviewed for Trump administration cyber
   roleDecember 9th, 2024
 * Medical device company says shipping processes disrupted by ransomware
   attackDecember 9th, 2024
 * Key electricity distributor in Romania warns of ‘cyber attack in
   progress’December 9th, 2024
 * Cooperate with Salt Typhoon probe, House chairman tells telecomsDecember 6th,
   2024
 * Pirated corporate software infects Russian businesses with info-stealing
   malwareDecember 6th, 2024
 * US org with ‘significant presence in China’ targeted by hackers, Symantec
   saysDecember 5th, 2024
 * Report: Russian authorities seized phone from detainee, infected it with
   spywareDecember 5th, 2024


BREAKING THE CIRCLE: CHINESE COMMUNIST PARTY PROPAGANDA INFRASTRUCTURE RAPIDLY
EXPANDS


Breaking the Circle: Chinese Communist Party Propaganda Infrastructure Rapidly
Expands


BLUEALPHA ABUSES CLOUDFLARE TUNNELING SERVICE FOR GAMMADROP STAGING
INFRASTRUCTURE


BlueAlpha Abuses Cloudflare Tunneling Service for GammaDrop Staging
Infrastructure


SCAM WEBSITES TAKE ADVANTAGE OF SEASONAL OPENINGS AND ESTABLISHED METHODS TO
MAXIMIZE IMPACT


Scam Websites Take Advantage of Seasonal Openings and Established Methods to
Maximize Impact


"OPERATION UNDERCUT" SHOWS MULTIFACETED NATURE OF SDA’S INFLUENCE OPERATIONS


"Operation Undercut" Shows Multifaceted Nature of SDA’s Influence Operations


RUSSIA-ALIGNED TAG-110 TARGETS ASIA AND EUROPE WITH HATVIBE AND CHERRYSPY


Russia-Aligned TAG-110 Targets Asia and Europe with HATVIBE and CHERRYSPY
 * 
 * 
 * 
 * 
 * 
 * 

 * Privacy

 * About

 * Contact Us

© Copyright 2024 | The Record from Recorded Future News