30 May 2023

Ukraine’s CERT warns of a new wave of SmokeLoader attacks


Ukraine’s CERT warns of a new wave of SmokeLoader attacks

Ukraine’s Computer Emergency Response Team (CERT-UA) said it detected a new phishing campaign by the UAC-0006 threat actor delivering the SmokeLoader malware

First detected in 2011, SmokeLoader is primarily a loader, and its main objective is to download or load a stealthier or more effective malware into the system. SmokeLoader variants are used for the purpose of information stealing, botnet, backdoor as well. SmokeLoader has also been used to load cryptominers, ransomware, banking trojans, and point of sale (PoS) malware.

The new campaign involves phishing emails using lures centered around invoices sent from previously compromised email accounts. The threat actor uses several methods to deliver the malware on the target system:

  • EML -> ZIP -> HTML (JavaScript) -> ZIP -> JavaScript (loader) -> EXE -> SmokeLoader

  • EML -> RAR -> VHDX -> JavaScript (loader) -> EXE -> SmokeLoader

  • EML -> RAR -> VHD -> JavaScript (loader) -> EXE -> SmokeLoader

The researchers say that they discovered a VHDX-file among the deleted files, which was Cobalt Strike Beacon malware.

The team notes that UAC-0006, which is characterized as a financially motivated operation, has changed some of its TTPs (tactics, techniques, and procedures), including the use of multiple infection methods, and the Cobalt Strike Beacon tool, indicating that the threat actor is expanding its malware arsenal.

Furthermore, the observed SmokeLoader variant contained 26 URLs associated with a botnet server, with most of them being unregistered domains.

The threat actor uses Russia-based registrars and providers to register domain names and host command and control infrastructure, including @reg.ru, @nic.ru, @iqhost.ru, @macloud.ru, @cloudx.ru.

Last week, CERT-UA warned of a cyber-espionage operation targeting an unnamed state entity in Ukraine. Tracked as UAC-0063, the activity appears to be part of a broader effort targeting organizations in Mongolia, Kazakhstan, Kyrgyzstan, Israel, and India.


Back to the list

Latest Posts

North Korea’s Lazarus adds new LightlessCan backdoor to its arsenal

North Korea’s Lazarus adds new LightlessCan backdoor to its arsenal

The hackers posed as a recruiter from Meta to gain access to the network of an aerospace firm.
2 October 2023
Critical Exim flaws put millions of servers at risk of hacker attacks

Critical Exim flaws put millions of servers at risk of hacker attacks

The vulnerabilities could allow attackers to breach the servers and gain access to sensitive data.
2 October 2023
Cyber Security Week in Review: September 29, 2023

Cyber Security Week in Review: September 29, 2023

The world in brief: the MOVEit protocol maker releases fixes for new critical bugs, Cisco warns of a zero-day in IOS and IOS XE software, and more.
29 September 2023