8 September 2022

Former Conti hackers adapt their techniques to use against Ukraine


Former Conti hackers adapt their techniques to use against Ukraine

Some ex-members of the well-known Conti ransomware group apparently have joined ranks of a hacker group security researchers track as UAC-0098 and are now adapting their tools with the purpose of attacking Ukrainian entities and hospitality industry and European humanitarian and non-profit organizations, according to a new report from Google’s Threat Analysis Group (TAG).

In May 2022, Conti officially shut down its operation, however, security researchers warned at the time that the gang didn't vanish, but simply split into smaller, more novel brands.

UAC-0098 is an initial access broker that provided various ransomware groups, including Quantum and Conti, with access to victims’ networks via the IcedID banking trojan. But more recently, the group has switched to attacks against Ukraine. Previously, the Computer Emergency Response Team of Ukraine detected a cyberattack on Ukraine’s critical infrastructure, which it attributed to UAC-0098.

TAG said they started tracking UAC-0098 after they discovered a phishing campaign in April that leveraged a backdoor access tool called AnchorMail (referred to as LackeyBuilder) developed by Conti. The tool previously was installed as a TrickBot module, TAG said.

“In the initial encounter with UAC-0098, “lackeyBuilder” was observed for the first time. This is a previously undisclosed builder for AnchorMail, one of the private backdoors used by the Conti groups. Since then, the actor consistently used tools and services traditionally employed by cybercrime actors for the purpose of acquiring initial access: IcedID trojan, EtterSilent malicious document builder, and the “Stolen Image Evidence” social engineering malware distribution service,” the report reads.

“UAC-0098 activities are representative examples of blurring lines between financially motivated and government backed groups in Eastern Europe, illustrating a trend of threat actors changing their targeting to align with regional geopolitical interests.”

Between April and August 2022, the team observed five different phishing campaigns. Some of the campaigns impersonated the National Cyber Police of Ukraine, the State Tax Service of Ukraine, or representatives of Elon Musk, StarLink and Microsoft to deliver the IcedID trojan on victims’ machines.

Google has also observed the threat actor exploiting the Microsoft MSDT vulnerability (CVE-2022-30190, aka Follina) to deliver malicious payloads. Previously CERT-UA reported about a similar campaign exploiting the Follina bug to push Cobalt Strike Beacon malware.


Back to the list

Latest Posts

Cyber security week in review: January 27, 2023

Cyber security week in review: January 27, 2023

The world in brief: the FBI dismantles the Hive ransomware operation, the League of Legend source code stolen in a hacker attack, and more.
27 January 2023
Hackers increasingly abusing RMM software for nefarious purposes

Hackers increasingly abusing RMM software for nefarious purposes

Hackers can use legitimate RMM software as a backdoor for persistence and/or command and control.
26 January 2023
GoTo says hackers stole encrypted backups, an encryption key

GoTo says hackers stole encrypted backups, an encryption key

The company said it found no evidence that other GoTo products or any of its production systems were affected.
25 January 2023