The operation began with reconnaissance of the company’s public-facing infrastructure, where threat actors identified vulnerable remote desktop services and outdated VPN gateways.
Leveraging a zero-day in a third-party web application firewall, the attackers gained initial foothold within the corporate network. Once inside, they deployed custom malware
Hromadske analysts noted that the malicious payload incorporated a dual-stage loader written in C++ and PowerShell.
The first stage established persistence via a malicious WMI subscription, while the second stage decrypted a reverse-shell implant in memory.
Communications were tunneled over TLS using forged certificates that mimicked the company’s own public key infrastructure.
The malware’s command-and-control (C2) infrastructure was hosted on compromised industrial control system servers, further complicating attribution and takedown efforts.
By the time defenders detected anomalous network traffic, the attackers had exfiltrated more than 47 TB of technical data, including drone design schematics, production logs, and employee records.
All backup copies on the victim’s servers were irreversibly deleted, effectively crippling Gaskar’s manufacturing and accounting operations.
Workers were locked out of production software and physical access systems, with only fire exits remaining functional.
Hromadske researchers identified key modules of the implant by reverse-engineering its unpacker.
The malware’s infection mechanism hinged on the exploitation of a WAF bypass. After gaining access, the attackers uploaded a tiny dropper—less than 15 KB—that executed a Base64-encoded PowerShell one-liner.
This script reached out to a hard-coded C2 domain, downloaded an encrypted payload, and invoked it entirely in memory to evade disk-based detection.
The persistent WMI event filter was crafted as follows:-
$filter = Set-WmiInstance -Namespace rootsubscription -Class __EventFilter `
-Arguments @{
Name = "SysUpdateFilter"
EventNameSpace = "rootcimv2"
QueryLanguage = "WQL"
Query = "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA 'Win32_LocalTime'"
}
Set-WmiInstance -Namespace rootsubscription -Class __FilterToConsumerBinding `
-Arguments @{
Filter = $filter
Consumer = $consumer
} This ensures execution on every system clock tick, granting the implant high survivability even after reboot.
Boost detection, reduce alert fatigue, accelerate response; all with an interactive sandbox built for security teams -> Try ANY.RUN Now
The post Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier appeared first on Cyber Security News.
Animated Icons is an animated icon library that you can easily use as components in…
Service platforms like CloudFlare have long been heralded for providing robust protection for legitimate websites,…
Nine critical vulnerabilities have been discovered in AppArmor, which is a widely used mandatory access…
A significant vulnerability in the GSSAPI Key Exchange patch was applied by numerous Linux distributions…
Meta has launched a suite of advanced anti-scam tools across WhatsApp, Facebook, and Messenger to…
James Gaffney doesn’t think Warner should spend more money than it has. He was behind…
This website uses cookies.