By Tom Kellermann, SVP Cyber Strategy, Contrast Security
July 24, 2023
Turla — a Russian advanced persistent threat (APT) group closely affiliated with the FSB Russian intelligence agency — is attacking Ukrainian defense forces with spying malware, according to research published on July 18 by the country’s computer emergency response team (CERT-UA).
Active since at least the early 2000s, Turla — aka Waterbug, Venomous Bear, Snake, Uroboros and KRYPTON — is targeting Ukrainian defense forces with Capibar and Kazuar spyware, according to CERT-UA.
In yet another example of what MITRE calls the group’s calling card of “targeted intrusions and innovative stealth,” Turla is using Capibar spyware to compromise Microsoft Exchange servers using a PowerShell tool, thereby turning a legitimate server into a malware control center. After the APT establishes a foothold, it loads the Kazuar backdoor onto infected computers in order to amass and exfiltrate all manner of data, including, for example, databases and configuration files of programs including KeePass, Azure, Gcloud, AWS and others.
It’s just the latest example of how Turla and other APTs are commandeering trusted organizations’ infrastructure. They’re not just doing so to spy on Russia’s enemies. In fact, similar tactics, techniques, and procedures (TTPs) are being used in a type of fraud that’s been trending since at least 2019: namely, reverse business email compromise (BEC).
Traditional BEC attacks have led to losses of tens of billions of dollars over the past several years. In such an attack, hackers hijack finance-related email threads and trick employees into wiring money to the wrong accounts. They do so by first spoofing an email account or website — for example, with slight variations on legitimate addresses (john.kelly@examplecompany.com vs. john.kelley@examplecompany.com) — in order to fool victims into thinking that the fake accounts are authentic.
Then, the attackers send spearphishing emails that look like they’re from a trusted sender as they try to trick victims into revealing confidential information that can grant access to company accounts, calendars and data: information they need to carry out the BEC schemes.
BEC has been modernized; reverse BEC does away with the need for kludgy spelling-variation spoofs. Rather, adversaries exploit vulnerabilities so as to commandeer a victim organization's Office 365 admin rights and, very selectively, through the use of machine learning, send out fileless malware against the board and the most senior executives from other companies that communicate with that organization.
Turla has lately been hijacking Office 365 administrator rights during application attacks or exploits of Microsoft vulnerabilities. Once the hackers are within the network and have gained admin rights of the victim company, they can kick BEC fraud into high gear because they no longer need to spoof the victim’s domain. Rather, they can simply send email that comes from the organization's legitimate domain.
Though Turla began to use reverse BEC years ago for espionage — including hacking information out of victims such as Department of Defense contractors — it’s now being used to manifest financial fraud.
As noted in Contrast Security’s 2023 Cyber Bank Heists report, digital front running is real, and cyberattacks are giving cyber crooks the ability to turn it into a state-of-the-art form.
Cybercrime cartels, of course, have brokerage accounts. In order to fund them, Russian cybercrime cartels are stealing information, trading on that insider info, and then doxing it to the media or regulators: a new type of e-fraud I’m calling “shoxing,” as in, shorting the stock and then doxing the confidential data Within 24 hours, the hackers will proceed to short the victimized company’s stock.
Has your company been breached? Even if you’re not being extorted, your internal secrets could be doxed, and your company’s stock could be shorted.
This is the first in a new series, entitled “Below the Waterline,” in which I’ll explore threats that organizations aren’t aware of or which they aren’t detecting. Stay tuned to find out what new threats are lurking below the surface and how to best protect your organization.
If you want to detect and block run-time attacks on known and unknown code vulnerabilities with greater precision, you want to check out Contrast Protect.
Read more:
Get the latest content from Contrast directly to your mailbox. By subscribing, you will stay up to date with all the latest and greatest from Contrast.