<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>Our researchers have been following the Gamaredon Group <span>(aka Primitive Bear) </span>for years now, but ever since the Russo-Ukraine war broke out - they've been more relevant than ever. January 14, 2022 marked the first Russian cyber-war move, when a series of reports were published claiming Russian cyber attacks on the Ukrainian government - numerous government websites taken down or defaced, various targeted attacks using WhisperGate on Ukrainian organizations, and more. Since then, Russia has been playing hard in the cyber battlefield - and Gamaredon is a lead player.</p> <!--more--> <h2>Who is the Gamaredon Group</h2> <p>The Gamaredon Group has been active since at least 2013, not long before Russia annexed the <a href="/blog/block-crimea-and-russian-ips" rel="noopener" target="_blank">Crimean peninsula</a>. Over the years, speculations about their primary motives have been confirmed, with security researchers seeing multiple attacks targeting Ukrainian government organizations and officials. Last year, the Security Service of Ukraine (SSU) publicly attributed the adversary to five Russian Federal Security Service (FSB) officers posted in Crimea. The SSU has also claimed that Gamaredon is capable of surpassing extremely successful Russian APTs like APT28 (Sofacy/Fancy Bear), SNAKE (Turla), and APT29 (Cozy Bear/The Dukes) in the scale of their attacks and damage.</p> <h2>Infection Tactics</h2> <p style="direction: ltr;"><span>Gamaredon usually leverages email spear phishing using malicious office file attachments to infect their victims. But that's not all - the APT has a few creative tricks up its sleeve. Once example is their campaign targeting a Western government entity. Instead of the classic email phish, they played out a meticulous, precise attack by submitting a malicious downloader camouflaged as a CV onto a job search platform.</span></p> <p style="direction: ltr; font-size: 12px;"><span><img src="https://www.threatstop.com/hubfs/gamaredonemail.png" alt="gamaredonemail" width="1280" loading="lazy" style="width: 1280px;"><em>Email sent to a Ukranian government inbox. Image: Unit42</em></span></p> <p><span>Once the malicious file is opened by the victim, a remote template injection technique is set in action. allowing the file to pull a malicious VBS script. The script then checks in with the APT's command and control (C2) servers, and after a wait period (6 hours for example), it will pull a SelF-eXtracting (SFX) archive - one of Gamaredon's signature moves. The threat actor has been spotted using this tactic to bundle in evasive remote access persistence tools to victims machines for years. Today, Gamaredon uses UltraVNC, which gives the C2 server control of the compromised system. VBS files are also usually bundled in the payload, and a custom Gamaredon malware is downloaded. </span></p> <h2>Malware Variants</h2> <p><span>Different Gamaredon attacks have used different malware variants over time. For many years now, the threat actor has been using their own custom-created malware variants. PowerPunch is Gamaredon's droppers and downloader family, which shares it's evasiveness characteristic with </span>Pterodo. The backdoor uses various obfuscation techniques, while giving the attackers <span>interactive access to the network so they can carry out their attack plans. QuietSieve, another custom malware, steals information from the target host such as <em>doc</em>,&nbsp;</span><span><em>docx</em>,&nbsp;<em>xls</em>, rtf, odt, txt, jpg, pdf, rar, zip and 7z files, as well as screenshots taken by the malware. </span>Other malware families employed by Gamaredon include ObfuMerry, ObfuBerry, DilongTrash, DinoTrain, and DesertDown.&nbsp;</p> <h2>Infrastructure</h2> <p>Gamaredon has been seen changing infrastructure over time. Analyzing hundreds of IOCs used by the APT in the past and present, it's clear that their favorite registrar by a landslide has always been REG-RU. Recently, <a href="https://blogs.cisco.com/security/network-footprints-of-gamaredon-group" rel="noopener" target="_blank">Cisco</a> released a table mapping the different IP spaces heavily associated with Gamaredon infrastructure.</p> <p><img src="https://www.threatstop.com/hubfs/cisco_regru.png" alt="cisco_regru" width="1266" loading="lazy" style="width: 1266px;"></p> <p style="font-size: 12px;"><em><span>Distribution of Gamaredon-related IP addresses per ASN and owner. </span>Image: Cisco</em></p> <p>By integrating over 900 different threat intelligence feeds, ThreatSTOP provides comprehensive coverage of Gamaredon IOCs for optimum protection. As new IOCs are discovered, they are swiftly added to our system and propagated to blocklists and policies on all ThreatSTOP-protected networks. Our Core Threats IP and domain bundles allow customers to block thousands of Gamaredon infrastructure IOCs, including the related REG-RU IP address spaces. Users who want to block Russia as a whole, not only by geo-blocking Russia, but also Crimea, Luhansk and Donetsk, and by blocking sanctioned Russian-related entities, can do so with our Russia Related bundles.</p> <p>&nbsp;</p> <div> <p>Not a ThreatSTOP customer yet? Want to see ThreatSTOP instantly eliminate attacks on your network?</p> </div> <aside> <div> <div></div> <div>&nbsp;</div> </div> </aside></span>