Sandworm (hacker group) explained

Sandworm
Formation: 2004–2007
Type:Advanced persistent threat
Purpose:Cyberespionage, cyberwarfare
Headquarters:22 Kirova Street
Khimki, Russia
Region:Russia
Methods:Zero-days, spearphishing, malware
Language:Russian
Parent Organization:GRU
Formerly:Voodoo Bear [1]
Iron Viking [2]
Telebots

Sandworm is an advanced persistent threat operated by Military Unit 74455, a cyberwarfare unit of the GRU, Russia's military intelligence service.[3] Other names for the group, given by cybersecurity researchers, include Telebots, Voodoo Bear, IRIDIUM, Seashell Blizzard,[4] and Iron Viking.[5] [6]

The team is believed to be behind the December 2015 Ukraine power grid cyberattack,[7] [8] [9] the 2017 cyberattacks on Ukraine using the NotPetya malware,[10] various interference efforts in the 2017 French presidential election,[5] and the cyberattack on the 2018 Winter Olympics opening ceremony.[11] [12] Then-United States Attorney for the Western District of Pennsylvania Scott Brady described the group's cyber campaign as "representing the most destructive and costly cyber-attacks in history."[5]

History

2014

On September 3, 2014 iSIGHT Partners (now Mandiant) discovered a spear-phishing campaign exploiting a zero-day vulnerability via weaponized Microsoft Office documents. The vulnerability, dubbed CVE-2014-4114, affected all versions of Windows from Vista to 8.1 and allowed attackers to execute arbitrary code on a target machine. Researchers were able to attribute the attack to the Sandworm group and observed that the Ukrainian government was one target of the campaign. Notably, this attack coincided with a NATO summit on Ukraine in Wales.[13]

2015 Ukraine power grid hack

See main article: 2015 Ukraine power grid hack.

On December 23, 2015, hackers launched a coordinated cyberattack against 3 energy companies in Ukraine and succeeded in temporarily disrupting the supply of electricity to about 230,000 Ukrainians for 1-6 hours.

In January, iSight Partners released a report linking the attack to Sandworm based on the usage of BlackEnergy 3. [14]

2016 Ukraine power grid hack

See main article: 2016 Kyiv cyberattack.

On December 17, 2016, a year after the previous power grid attack, hackers again disrupted the Ukrainian power grid with a cyber attack. About one fifth of Kyiv lost power for an hour. While the outage was ultimately short, a report released 3 years after the attack by security firm Dragos outlines a theory that the malware, known as Industroyer or CRASHOVERRIDE, was meant to destroy physical electrical equipment. By exploiting a known vulnerability in the protective relays, the malware may have been designed to obfuscate any safety issues such that when engineers worked to restore power, an overload of current would be sent to destroy transformers or power lines. Such destruction would have potentially harmed utility workers as well as led to a much longer power outage if it had succeeded. [15]

2018 Winter Olympics

On February 9, 2018 during the opening ceremony of the Winter Olympics in Pyeongchang, South Korea hackers launched a cyberattack and successfully disrupted IT infrastructure including WiFi, TVs around the Pyeongchang Olympic Stadium showing the ceremony, RFID-based security gates, and the official Olympics app which was used for digital ticketing. Staff were able to restore most critical functions before the opening ceremony was over, but the entire network had to be rebuilt from scratch. Wiper malware had wormed through every domain controller and rendered them inoperable.

3 days later Cisco Talos published a report dubbing the malware "Olympic Destroyer". The report listed similarities in the malware's propagation techniques to the "BadRabbit" and "Nyetya" malware strains and stated disruption of the games as the attack's objective. [16]

Attribution of the Olympic Destroyer malware proved difficult as it appeared the author(s) had included code samples belonging to multiple threat actors as false flags. Intezer published a report on Feb 12 showing code similarities to samples attributed to 3 Chinese threat actors while a follow-up Talos report noted a "weak" clue pointing to another wiper created by a spinoff of the Lazarus Group, a North Korean APT.[17] [18]

The Kaspersky GReAT team on March 8 published 2 blog posts discussing the current industry theories and their own original research. In the technical article Kaspersky, a Russian company, showed in detail how they discovered file headers pointing to Lazarus Group were forged but stopped short of attributing the Olympic Destroyer malware to any non-North Korean group.[19] [20]

US Indictment (2020)

On 19 October 2020, a US-based grand jury released an indictment charging six alleged Unit 74455 officers with cybercrimes.[21] [22] [23] The officers, Yuriy Sergeyevich Andrienko, Sergey Vladimirovich Detistov, Pavel Valeryevich Frolov, Anatoliy Sergeyevich Kovalev, Artem Valeryevich Ochichenko, and Petr Nikolayevich Pliskin, were all individually charged with conspiracy to conduct computer fraud and abuse, conspiracy to commit wire fraud, wire fraud, damaging protected computers, and aggravated identity theft. Five of the six were accused of overtly developing hacking tools, while Ochichenko was accused of participating in spearphishing attacks against the 2018 Winter Olympics and conducting technical reconnaissance on and attempting to hack the official domain of the Parliament of Georgia.[5]

Concurrent with the US indictment announcement, the UK's National Cyber Security Centre (NCSC) published a report which publicly associated Sandworm with the 2018 Winter Olympics attack.

Exim Exploitation (2020)

On May 28, 2020 the National Security Agency published a cybersecurity advisory warning that the Sandworm group was actively exploiting a remote code execution vulnerability (referred to as CVE-2019-10149) in Exim[24] to gain full control of mail servers.[25] At the time the advisory was published, an updated version of Exim had been available for a year and the NSA urged administrators to patch their mail servers.

Cyclops Blink (2022)

In February 2022, Sandworm allegedly released the Cyclops Blink as malware. The malware is similar to VPNFilter.[26] The malware allows a botnet to be constructed, and affects Asus routers and WatchGuard Firebox and XTM appliances. CISA issued a warning about this malware.[27]

War Crimes Request (March 2022)

In late March 2022, human rights investigators and lawyers in the UC Berkeley School of Law sent a formal request to the Prosecutor of the International Criminal Court in The Hague.[28] They urged the International Criminal Court to consider war crimes charges against Russian hackers for cyberattacks against Ukraine.[28] Sandworm was specifically named in relation to December 2015 attacks on electrical utilities in western Ukraine and 2016 attacks on utilities in Kyiv in 2016.[28]

Ukrainian Power Grid Attack (April 2022)

In April 2022, Sandworm attempted a blackout in Ukraine.[29] It is said to be the first attack in five years to use an Industroyer malware variant called Industroyer2.[30]

SwiftSlicer (January 2023)

On 25 January 2023, ESET attributed an Active Directory vulnerability wiper to Sandworm.[31]

Infamous Chisel (August 2023)

On August 31, 2023, the cybersecurity agencies of the US, UK, Canada, Australia, and New Zealand (collectively known as Five Eyes) jointly published a report on a new malware campaign and attributed it to Sandworm. The malware, dubbed "Infamous Chisel", targeted Android devices used by the Ukrainian military. After initial infection, the malware establishes persistent access then periodically collects and exfiltrates data from the compromised device. Collected information includes:

The malware also periodically collects open ports and banners of services running on other hosts on the local network. Additionally, an SSH server is created and configured to run as a Tor hidden service. An attacker could then connect remotely to the infected device without revealing their true IP address.[32]

Name

The name "Sandworm" was dubbed by researchers at iSight Partners (now Mandiant) due to references in the malware source code to Frank Herbert's novel Dune.[33]

See also

Further reading

. Sandworm: a new era of cyberwar and the hunt for the Kremlin's most dangerous hackers . 2019 . Knopf Doubleday . 978-0-385-54441-2 . Andy Greenberg.

External links

Notes and References

  1. Web site: VOODOO BEAR | Threat Actor Profile | CrowdStrike . Adam Meyers . January 29, 2018 . Crowdstrike.
  2. Web site: UK exposes series of Russian cyber attacks against Olympic and Paralympic Games . National Cyber Security Centre . October 19, 2020 .
  3. Book: Greenberg, Andy . Andy Greenberg

    . Sandworm: a new era of cyberwar and the hunt for the Kremlin's most dangerous hackers . 2019 . Knopf Doubleday . 978-0-385-54441-2 . Andy Greenberg.

  4. Web site: How Microsoft names threat actors . Microsoft . 21 January 2024.
  5. News: . 19 October 2020 . Six Russian GRU Officers Charged in Connection with Worldwide Deployment of Destructive Malware and Other Disruptive Actions in Cyberspace . DOJ Office of Public Affairs . . 23 July 2021.
  6. News: Timberg . Craig . Nakashima . Ellen . Munzinger . Hannes . Tanriverdi . Hakan . 2023-03-30 . Secret trove offers rare look into Russian cyberwar ambitions . 2023-03-31 . . en.
  7. Web site: 5 January 2016 . Hackers shut down Ukraine power grid . www.ft.com . 28 October 2020.
  8. News: Volz . Dustin . 25 February 2016 . U.S. government concludes cyber attack caused Ukraine power outage . Reuters . 28 October 2020.
  9. News: Hern . Alex . 7 January 2016 . Ukrainian blackout caused by hackers that attacked media company, researchers say . The Guardian . 0261-3077 . 28 October 2020.
  10. The Untold Story of NotPetya, the Most Devastating Cyberattack in History . Wired . 1059-1028 . 28 October 2020.
  11. Greenberg . Andy . Inside Olympic Destroyer, the Most Deceptive Hack in History . Wired . 1059-1028 . 28 October 2020 . Andy Greenberg.
  12. Russian Military Intelligence: Background and Issues for Congress . Andrew S. Bowen . 24 November 2020 . . 16 . 21 July 2021.
  13. Web site: iSIGHT discovers zero-day vulnerability CVE-2014-4114 used in Russian cyber-espionage campaign . October 14, 2014 . Stephen Ward . November 5, 2023 . https://web.archive.org/web/20141014083644/http://www.isightpartners.com/2014/10/cve-2014-4114/ . October 14, 2014 . dead.
  14. Web site: Hultquist . John . Sandworm Team and the Ukrainian Power Authority Attacks . iSIGHT Partners . https://web.archive.org/web/20160129185858/http://www.isightpartners.com/2016/01/ukraine-and-sandworm-team/ . Jan 29, 2016 . Jan 7, 2016 . dead.
  15. Web site: CRASHOVERRIDE: Reassessing the 2016 Ukraine Electric Power Event as a Protection-Focused Attack. August 15, 2019 . Joe Slowik . Dragos Inc. .
  16. Web site: Olympic Destroyer Takes Aim At Winter Olympics. Feb 12, 2018 . Warren Mercer . Cisco Talos .
  17. Web site: Who Wasn't Responsible for Olympic Destroyer? . Rascagneres . Paul . Lee . Martin . Cisco Talos . February 26, 2018.
  18. Web site: 2018 Winter Cyber Olympics: Code Similarities with Cyber Attacks in Pyeongchang . Feb 12, 2018 . Jay Rosenberg . https://web.archive.org/web/20200630214807/https://www.intezer.com/blog/research/2018-winter-cyber-olympics-code-similarities-cyber-attacks-pyeongchang/ . June 30, 2020.
  19. Web site: https://web.archive.org/web/20190131032535/https:/securelist.com/olympicdestroyer-is-here-to-trick-the-industry/84295/ . OlympicDestroyer is here to trick the industry. Jan 31, 2019 . Kaspersky GReAT Team . 8 March 2018 .
  20. Web site: https://web.archive.org/web/20190222070239/https://securelist.com/the-devils-in-the-rich-header/84348/ . The devil's in the Rich header. Feb 22, 2019 . Kaspersky GReAT Team . 8 March 2018 .
  21. Web site: Cimpanu . Catalin . US charges Russian hackers behind NotPetya, KillDisk, OlympicDestroyer attacks . ZDNet . 28 October 2020.
  22. Web site: 19 October 2020 . Russian cyber-attack spree shows what unrestrained internet warfare looks like . The Guardian . 28 October 2020.
  23. US Indicts Sandworm, Russia's Most Destructive Cyberwar Unit . Wired . 1059-1028 . 28 October 2020.
  24. Web site: CVE-2019-10149: Critical Remote Command Execution Vulnerability Discovered In Exim . June 6, 2019 . Satnam Narang . November 4, 2023.
  25. Web site: Exim Mail Transfer Agent Actively Exploited by Russian GRU Cyber Actors . https://web.archive.org/web/20230324231458/https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/2196511/exim-mail-transfer-agent-actively-exploited-by-russian-gru-cyber-actors/ . live . March 24, 2023 . National Security Agency.
  26. Web site: Hardcastle . Jessica Lyons . Cyclops Blink malware sets up shop in ASUS routers . 21 March 2022 . www.theregister.com . en.
  27. Web site: CISA Adds Eight Known Exploited Vulnerabilities to Catalog CISA . www.cisa.gov . 11 April 2022 . 13 April 2022.
  28. The Case for War Crimes Charges Against Russia's Sandworm Hackers . Greenberg . Andy . 12 May 2022 . 7 July 2022 . . Andy Greenberg.
  29. Greenberg . Andy . Russia's Sandworm Hackers Attempted a Third Blackout in Ukraine . en-US . Wired . 13 April 2022 . 1059-1028.
  30. Web site: Industroyer2: Industroyer reloaded. www.welivesecurity.com. 13 April 2022.
  31. Web site: Živé.sk . 27 January 2023 . Na Ukrajine maže počítače nový trójsky kôň. Hackeri majú byť prepojení na Rusko . 27 January 2023 . Živé.sk . sk.
  32. Web site: Infamous Chisel Malware Analysis Report . 31 August 2023 . Cybersecurity & Infrastructure Security Agency . 6 November 2023.
  33. Russian 'Sandworm' Hack Has Been Spying on Foreign Governments for Years . Kim Zetter . October 14, 2014 . https://web.archive.org/web/20141014081835/https://www.wired.com/2014/10/russian-sandworm-hack-isight/ . live . October 14, 2014 . Wired .