Cisco Talos Blog: Gamaredon campaign abuses LNK files to distribute Remcos backdoor

Source URL: https://blog.talosintelligence.com/gamaredon-campaign-distribute-remcos/
Source: Cisco Talos Blog
Title: Gamaredon campaign abuses LNK files to distribute Remcos backdoor

Feedly Summary: Cisco Talos is actively tracking an ongoing campaign, targeting users in Ukraine with malicious LNK files which run a PowerShell downloader since at least November 2024.

AI Summary and Description: Yes

**Summary:** The text details a malicious cyber campaign by the Gamaredon threat group targeting users in Ukraine through phishing techniques using LNK files that enact a PowerShell downloader. This campaign leverages war-related themes, specifically the Ukraine invasion, as a lure for users, ultimately facilitating the installation of the Remcos backdoor.

**Detailed Description:**

The ongoing cyber campaign tracked by Cisco Talos demonstrates a sophisticated method of distributing malware using social-engineering tactics linked to current events (in this case, the Ukraine war). Key points of analysis include:

– **Attack Vector:**
– The threat actors use LNK files associated with Ukrainian and Russian military terminology to entice victims.
– These files run a PowerShell downloader upon execution, which is a common method for bypassing security measures.

– **Payload Delivery:**
– From the PowerShell downloader, a second stage payload (a ZIP file) is downloaded from geo-fenced servers based in Russia and Germany.
– The second-stage payload uses DLL side loading to execute the Remcos backdoor.

– **Themes and Social Engineering:**
– Gamaredon has been observed using themes related to military movements in their phishing campaigns to entice users to click on malicious links or files.
– Examples of file names reveal a deliberate choice to evoke urgency or military relevance.

– **Network Infrastructure:**
– The servers facilitating the malware’s download are primarily hosted by two ISPs: GTHost and HyperHosting, indicating a deliberate choice of infrastructure to mask their activities.
– Talos recorded instances of reverse DNS discrepancies among the servers, which could point to efforts by attackers to obscure their digital footprints.

– **Execution Methodology:**
– The campaign employs PowerShell scripts capable of managing commands indirectly to evade antivirus detection.
– The Remcos payload uses DLL side loading, often associated with legitimate applications to avoid suspicion during execution.

– **Threat Mitigation Measures:**
– Cisco recommends utilizing various products from their security suite, including Cisco Secure Endpoint and Cisco Secure Email, to detect and block such threats effectively.
– Implementation of multi-factor authentication (Cisco Duo) and secure access methods rooted in Zero Trust principles are advocated.

– **Indicators of Compromise (IOCs):**
– The report offers specific IOCs for cybersecurity professionals to recognize and mitigate risks posed by this threat.

This analysis underscores the ongoing risks posed by state-sponsored or geopolitically motivated cyber actors in today’s security landscape, emphasizing the need for robust defenses and proactive monitoring. Cybersecurity professionals should remain vigilant, especially in contexts of heightened geopolitical strain.