3 May 2023

Russia-linked Sandworm continuing to target Ukraine with destructive attacks


Russia-linked Sandworm continuing to target Ukraine with destructive attacks

Ukraine’s government emergency response team (CERT-UA) detected a cyberattack against an unnamed government organization seeking to disable server equipment, user workstations and data storage systems.

CERT-UA has linked this attack to Sandworm (UAC-0165), a threat actor believed to be one of Russia's military cyber units. The team said the recent attack used a combination of BAT and Bash scripts to destroy files on both Windows and Linux machines.

In case of Windows systems the threat actor leveraged RoarBat, a BAT script designed to search certain files, archive them using the legitimate WinRAR software and then delete both the original file and the archive.

On Linux machines Sandworm used a Bash script and the “dd” utility to replace the content of the file with zero-bytes.

CERT-UA says that the threat actor gained initial access to the victim’s systems through the VPN service using compromised credentials. The team has also noted that this attack is similar to another destructive Sandworm operation that targeted Ukrainian state news agency Ukrinform in January 2023 with at least five malware wipers, including CaddyWiper (Windows), ZeroWipe (Windows), SDelete (Windows), AwfulShred (Linux), and BidSwipe (FreeBSD).

Earlier this week, CERT-UA detailed a phishing campaign orchestrated by a Russia-linked threat actor known as APT28, which targeted Ukrainian government organizations with fake ‘Windows Update’ guides.


Back to the list

Latest Posts

Threat actors abusing Foxit PDF Reader flaw to deploy multiple malware variants

Threat actors abusing Foxit PDF Reader flaw to deploy multiple malware variants

The flaw involves Foxit PDF Reader's handling of pop-up messages.
20 May 2024
China-linked APT group uses malware to spy on commercial shipping

China-linked APT group uses malware to spy on commercial shipping

Mustang Panda infiltrated the computer systems of cargo shipping companies in Norway, Greece, and the Netherlands.
20 May 2024
The Grandoreiro malware is back up and running after January disruption

The Grandoreiro malware is back up and running after January disruption

Grandoreiro now targets over 1,500 banks worldwide, spanning more than 60 countries across Central and South America, Africa, Europe, and the Indo-Pacific region.
20 May 2024