Virtual Event Today: Supply Chain Security Summit - Join Event In-Progress

Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Email Security

No Smoking Gun Tying Russia to Spear-Phishing Attack, Microsoft Says

Not Enough Evidence That Russians Are Behind Recent Spear-Phishing Attack, Microsoft Says

Not Enough Evidence That Russians Are Behind Recent Spear-Phishing Attack, Microsoft Says

There is not enough evidence to attribute a recent wave of spear-phishing emails impersonating personnel at the United States Department of State to Russian hackers, Microsoft says. 

The attack, which started on November 14, was previously said to have been the work of Cozy Bear, a Russian threat actor involved in hacking incidents during the 2016 U.S. presidential election. Microsoft, which tracks the adversary as YTTRIUM, begs to differ. 

“Microsoft does not yet believe that enough evidence exists to attribute this campaign to YTTRIUM,” the software giant says

The recently observed spear-phishing emails targeted public sector institutions and non-governmental organizations like think tanks and research centers, but also hit educational institutions and private-sector corporations in the oil and gas, chemical, and hospitality industries.

The campaign, which closely resembled attacks attributed to nation-states, targeted thousands of individual recipients in hundreds of organizations. Although distributed around the world, most of the targets are located in the United States, while others are in Europe, Hong Kong, India, and Canada.

Impersonating the identity of individuals working at the United States Department of State, the spear-phishing emails mimicked sharing notifications from OneDrive. Once the recipient clicked a link in the emails, however, an exploitation chain leading to the installation of a DLL backdoor would start. 

The emails contained a link leading to a legitimate but compromised website, and also containing random strings which Microsoft believes were likely used to identify distinct targeted individuals who clicked on the link. 

As soon as the user clicked on the link, a ZIP archive containing a malicious Windows shortcut (.LNK) file was delivered. The LNK file executed an obfuscated PowerShell command to extract a base64-encoded payload from within the LNK itself. 

This encoded payload, another heavily obfuscated PowerShell script, would fetch two additional resources from within the .LNK file. The second stage in this attack was an instance of Cobalt Strike, a commercially available penetration testing tool. 

A third-stage was also used, in the form of a PE file with a Meterpreter header, which gets loaded and connects to a command-and-control (C&C) server address found inside configuration info in the PE file. 

A feature-rich penetration testing tool, Cobalt Strike provides attackers with remote access to the infected computer. Some of the capabilities available to attackers include reconnaissance, privilege escalation, keylogging, execution of arbitrary commands through PowerShell or WMI, and the downloading and installation of additional malware.

Related: Suspected Russian Hackers Impersonate State Department Aide

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Application Security

After skipping last month, Adobe returned to its scheduled Patch Tuesday cadence with the release of fixes for at least 38 vulnerabilities in multiple...