Sandworm APT targets Ukraine with trojanized Microsoft KMS activation tools

Sandworm APT targets Ukraine with trojanized Microsoft KMS activation tools

Russian military hackers have ramped up their attacks on Ukrainian systems with a sophisticated malware campaign that exploits pirated software. Researchers from EclecticIQ have linked the new wave of attacks to the Sandworm threat actors, which has targeted Windows users in Ukraine with trojanized Microsoft Key Management Service (KMS) activators and fake Windows updates.

The attacks, which likely began in late 2023, have been tied to Sandworm hackers due to overlapping infrastructure, consistent Tactics, Techniques, and Procedures (TTPs), and the use of ProtonMail accounts to register malicious domains.

Sandworm, also tracked as UAC-0113, APT44, and Seashell Blizzard, has been active since at least 2009. The group is part of the Russian military’s Main Intelligence Directorate (GRU), specifically Military Unit 74455.

The main objective of the attacks appears to be large-scale espionage, data theft, and network compromise.

EclecticIQ’s investigation revealed that the attackers utilized a BACKORDER loader to deploy DarkCrystal RAT (DcRAT), a remote access Trojan (RAT) previously used in Sandworm’s past operations. The malware is delivered through seemingly harmless tools like fake KMS activation tools, which trick users into thinking they are activating their Windows software. Once executed, the tools disable Windows Defender and install the malicious loader in the background.

The final payload is the DcRAT malware, capable of pilfering sensitive data from the infected system. The malware is capable of logging keystrokes, capturing browser cookies and history, exfiltrating saved credentials, FTP credentials, and taking screenshots. The stolen data is then sent to servers controlled by the attackers, allowing them to harvest valuable information.

“Many users, including businesses and critical entities, have turned to pirated software from untrusted sources, giving adversaries like Sandworm a prime opportunity to embed malware in widely used programs,” noted EclecticIQ in the report.


Back to the list

Latest Posts

UAT-5918 info-stealing campaign targets critical infrastructure entities in Taiwan

UAT-5918 info-stealing campaign targets critical infrastructure entities in Taiwan

The tactics and tools employed by UAT-5918 overlap with other state-sponsored threat groups, such as Volt Typhoon, Flex Typhoon, and Earth Estries.
20 March 2025
New supply chain attack allows to inject malicious code via AI code editors

New supply chain attack allows to inject malicious code via AI code editors

By exploiting hidden unicode characters and employing advanced evasion techniques, attackers can subtly alter the behavior of AI models.
19 March 2025
Russian disinformation actors employ new tactics to maintain influence

Russian disinformation actors employ new tactics to maintain influence

Rather than immediately deploying newly registered domains, many threat actors now secure domain names months in advance.
19 March 2025