Categories: Cyber Security News

Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier

Last week, Ukraine’s Main Intelligence Directorate (GUR) orchestrated a sophisticated cyberattack against Gaskar Integration, a leading Russian drone manufacturer.

The operation began with reconnaissance of the company’s public-facing infrastructure, where threat actors identified vulnerable remote desktop services and outdated VPN gateways.

Leveraging a zero-day in a third-party web application firewall, the attackers gained initial foothold within the corporate network. Once inside, they deployed custom malware

Sponsored
that exploited Windows Management Instrumentation (WMI) to execute lateral movement and harvest credentials.

Hromadske analysts noted that the malicious payload incorporated a dual-stage loader written in C++ and PowerShell.

The first stage established persistence via a malicious WMI subscription, while the second stage decrypted a reverse-shell implant in memory.

Communications were tunneled over TLS using forged certificates that mimicked the company’s own public key infrastructure.

The malware’s command-and-control (C2) infrastructure was hosted on compromised industrial control system servers, further complicating attribution and takedown efforts.

By the time defenders detected anomalous network traffic, the attackers had exfiltrated more than 47 TB of technical data, including drone design schematics, production logs, and employee records.

All backup copies on the victim’s servers were irreversibly deleted, effectively crippling Gaskar’s manufacturing and accounting operations.

Workers were locked out of production software and physical access systems, with only fire exits remaining functional.

Sponsored

Hromadske researchers identified key modules of the implant by reverse-engineering its unpacker.

Infection Mechanism

The malware’s infection mechanism hinged on the exploitation of a WAF bypass. After gaining access, the attackers uploaded a tiny dropper—less than 15 KB—that executed a Base64-encoded PowerShell one-liner.

This script reached out to a hard-coded C2 domain, downloaded an encrypted payload, and invoked it entirely in memory to evade disk-based detection.

The persistent WMI event filter was crafted as follows:-

$filter = Set-WmiInstance -Namespace rootsubscription -Class __EventFilter `
  -Arguments @{
    Name = "SysUpdateFilter"
    EventNameSpace = "rootcimv2"
    QueryLanguage = "WQL"
    Query = "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA 'Win32_LocalTime'"
  }
Set-WmiInstance -Namespace rootsubscription -Class __FilterToConsumerBinding `
  -Arguments @{
    Filter = $filter
    Consumer = $consumer
  }

This ensures execution on every system clock tick, granting the implant high survivability even after reboot.

Boost detection, reduce alert fatigue, accelerate response; all with an interactive sandbox built for security teams -> Try ANY.RUN Now

The post Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Animated Icon Component Library for React/Vue/Svelte/Solid/Web Component

Animated Icons is an animated icon library that you can easily use as components in…

32 minutes ago

Credential Theft Surge As Attackers Exploit Cloudflare Anti‑Security

Service platforms like CloudFlare have long been heralded for providing robust protection for legitimate websites,…

42 minutes ago

Critical CrackArmor Vulnerabilities Expose 12.6 Million Linux Servers to Complete Root Takeover

Nine critical vulnerabilities have been discovered in AppArmor, which is a widely used mandatory access…

1 hour ago

OpenSSH GSSAPI Vulnerability Allow an Attacker to Crash SSH Child Processes

A significant vulnerability in the GSSAPI Key Exchange patch was applied by numerous Linux distributions…

1 hour ago

Meta Launches New Anti-Scam Tools on WhatsApp, Facebook and Messenger

Meta has launched a suite of advanced anti-scam tools across WhatsApp, Facebook, and Messenger to…

1 hour ago

Tax cap vote in Warner fails, operating budget passes in town meeting

James Gaffney doesn’t think Warner should spend more money than it has. He was behind…

1 hour ago

This website uses cookies.