Financially-motivated hackers believed to be operating out of Russia recently targeted companies in Western Europe, and the attacks apparently involved a combination of two Windows vulnerabilities that Microsoft did not expect to be exploited.
According to Singapore-based cybersecurity firm Group-IB, the threat groups tracked as TA505 (aka Evil Corp) and Silence — the company previously found links between the two groups — targeted at least two pharmaceutical and manufacturing companies in Belgium and Germany in late January.
The attacks have been attributed to Silence and TA505 based on the used tools, but it’s possible that only one of them was involved.
Analysis of the infrastructure used by the hackers led to the discovery of an executable named comahawk.exe that incorporated two local privilege escalation exploits targeting Windows.
The vulnerabilities, tracked as CVE-2019-1405 and CVE-2019-1322, were patched by Microsoft in November 2019 and October 2019, respectively. Microsoft’s advisories for both these flaws say “exploitation [is] less likely”
In mid-November 2019, NCC Group, whose researchers reported the vulnerabilities to Microsoft, published a blog post describing the weaknesses. Shortly after, someone made public an exploit named COMahawk that weaponizes CVE-2019-1405 and CVE-2019-1322.
Group-IB researchers uncovered this exploit on the attacker’ servers and they believe it was likely deployed in the campaign targeting European companies.
TA505 has used several pieces of malware in its operations, including the Dridex banking trojan and the Locky ransomware. Group-IB believes that the German and Belgian companies may have been targeted either with ransomware or as part of a “complex supply-chain attack.”
Earlier this month, cybersecurity firm Prevailion published a report detailing attacks launched by TA505 against German companies. The attacks involved trojanized resumes sent to the human resources department at targeted businesses.
A report published in August 2019 by Group-IB revealed that the Silence group had stolen roughly $3.5 million since September 2018. Silence had targeted banks in over 30 countries across Europe, Latin America, Africa, and Asia.
If Silence was involved in the recent attacks on pharmaceutical and manufacturing companies, it could indicate a shift in their strategy, Group-IB said.
Related: US, UK: Russian Hackers Hijacked Iranian Malware, Infrastructure
Related: Russian Hackers Leverage IoT Devices to Access Corporate Networks

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data
- Barracuda Urges Customers to Replace Hacked Email Security Appliances
- Google Patches Third Chrome Zero-Day of 2023
- ChatGPT Hallucinations Can Be Exploited to Distribute Malicious Code Packages
- AntChain, Intel Create New Privacy-Preserving Computing Platform for AI Training
- Several Major Organizations Confirm Being Impacted by MOVEit Attack
- Verizon 2023 DBIR: Human Error Involved in Many Breaches, Ransomware Cost Surges
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
Latest News
- Consolidate Vendors and Products for Better Security
- Pharmaceutical Giant Eisai Takes Systems Offline Following Ransomware Attack
- Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data
- North Korean Hackers Blamed for $35 Million Atomic Wallet Crypto Theft
- Cisco Patches Critical Vulnerability in Enterprise Collaboration Solutions
- Barracuda Urges Customers to Replace Hacked Email Security Appliances
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- BBC, British Airways, Novia Scotia Among First Big-Name Victims in Global Supply-Chain Hack
