Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

CISA Says Russian Hackers Targeting Western Supply-Lines to Ukraine

Russian military intelligence hackers intensify targeting of Western logistics and technology companies moving supplies into Ukraine. 

Russia wiper attack on Ukraine

The US government’s cybersecurity agency CISA is sounding the alarm over what it calls an “elevated threat” from Russia’s military-intelligence hackers, warning that Unit 26165 (APT28/Fancy Bear) is systematically zeroing in on Western logistics and technology companies that move weapons, aid and other supplies into Ukraine. 

The alert, issued Wednesday alongside US, UK, German and dozens of other allied agencies, urges organizations in the logistics space to assume they are already in the sights of Russian APTs and to “posture network defenses with a presumption of targeting.” 

According to technical documentation released by CISA, the GRU-linked espionage campaign has been underway since early 2022, expanding as the conflict with Ukraine intensified. 

The agency said shipping brokers, rail operators, port authorities, air-traffic managers, defense contractors and the IT firms that connect them have all been swept up in the operation, with victims logged across at least 13 NATO countries, the United States and Ukraine.

“The actors also conducted reconnaissance on at least one entity involved in the production of industrial control system (ICS) components for railway management, though a successful compromise was not confirmed,” the agency said.

The CISA joint-advisory describes a Moscow hacker playbook that mixes old-school password-spraying and spear-phishing runs with more surgical exploits. The group has been seen launching exploits against Microsoft Outlook’s NTLM bug (CVE-2023-23397) to collect NTLM hashes, and a trio of Roundcube web-mail flaws and last year’s WinRAR archive bug to break in, then piggybacking on home-office routers and other edge gear to hide its tracks.

Once inside, CISA explained that the operators escalate quickly: abusing Exchange mailbox permissions to harvest email at scale, looting Active Directory with Impacket and PsExec, and dropping custom malware such as HEADLACE and MASEPIE to maintain persistence and exfiltrate hijacked data. 

“After an initial compromise using one of the above techniques, Unit 26165 actors conducted contact information reconnaissance to identify additional targets in key positions. The actors also conducted reconnaissance of the cybersecurity department, individuals responsible for coordinating transport,  and other companies cooperating with the victim entity,” according to the advisory.

Advertisement. Scroll to continue reading.

One priority target is shipping manifests, including train, plane and container numbers that CISA notes reveal exactly what is headed to Ukraine and when. The advisory links the network intrusions to a parallel effort that hijacked thousands of IP cameras at border crossings and rail yards, giving Russian intelligence a real-time view of aid convoys.

The government is pushing organizations in the targeted sectors to tighten identity controls, deploy MFA (multi-factor authentication) technology that resists phishing, hunt aggressively for the Outlook, Roundcube and WinRAR exploit chains, and assume any publicly exposed device can be a foothold.   

“Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of Unit 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise (IOCs),” the agency said.

Related: NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch

Related: Russian APT Exploiting Mail Servers Against Gov, Defense Orgs

Related: France Blames Russia for Cyberattacks on Dozen Entities

Related: Fresh Windows NTLM Vulnerability Exploited in Attacks

Related: Russian GRU Unit Tied to Assassinations Linked to Global Cyberattacks

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Watch Now

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

People on the Move

Cloud security startup Upwind has appointed Rinki Sethi as Chief Security Officer.

SAP security firm SecurityBridge announced the appointment of Roman Schubiger as the company’s new CRO.

Cybersecurity training and simulations provider SimSpace has appointed Peter Lee as Chief Executive Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.