Categories: Cyber Security News

Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier

Last week, Ukraine’s Main Intelligence Directorate (GUR) orchestrated a sophisticated cyberattack against Gaskar Integration, a leading Russian drone manufacturer.

The operation began with reconnaissance of the company’s public-facing infrastructure, where threat actors identified vulnerable remote desktop services and outdated VPN gateways.

Leveraging a zero-day in a third-party web application firewall, the attackers gained initial foothold within the corporate network. Once inside, they deployed custom malware that exploited Windows Management Instrumentation (WMI) to execute lateral movement and harvest credentials.

Hromadske analysts noted that the malicious payload incorporated a dual-stage loader written in C++ and PowerShell.

The first stage established persistence via a malicious WMI subscription, while the second stage decrypted a reverse-shell implant in memory.

Communications were tunneled over TLS using forged certificates that mimicked the company’s own public key infrastructure.

The malware’s command-and-control (C2) infrastructure was hosted on compromised industrial control system servers, further complicating attribution and takedown efforts.

By the time defenders detected anomalous network traffic, the attackers had exfiltrated more than 47 TB of technical data, including drone design schematics, production logs, and employee records.

All backup copies on the victim’s servers were irreversibly deleted, effectively crippling Gaskar’s manufacturing and accounting operations.

Workers were locked out of production software and physical access systems, with only fire exits remaining functional.

Hromadske researchers identified key modules of the implant by reverse-engineering its unpacker.

Infection Mechanism

The malware’s infection mechanism hinged on the exploitation of a WAF bypass. After gaining access, the attackers uploaded a tiny dropper—less than 15 KB—that executed a Base64-encoded PowerShell one-liner.

This script reached out to a hard-coded C2 domain, downloaded an encrypted payload, and invoked it entirely in memory to evade disk-based detection.

The persistent WMI event filter was crafted as follows:-

$filter = Set-WmiInstance -Namespace rootsubscription -Class __EventFilter `
  -Arguments @{
    Name = "SysUpdateFilter"
    EventNameSpace = "rootcimv2"
    QueryLanguage = "WQL"
    Query = "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA 'Win32_LocalTime'"
  }
Set-WmiInstance -Namespace rootsubscription -Class __FilterToConsumerBinding `
  -Arguments @{
    Filter = $filter
    Consumer = $consumer
  }

This ensures execution on every system clock tick, granting the implant high survivability even after reboot.

Boost detection, reduce alert fatigue, accelerate response; all with an interactive sandbox built for security teams -> Try ANY.RUN Now

The post Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

GDPR Cookie Banner With Category Consent API – Neiki’s Cookie Banner

Neiki’s Cookie Banner is a vanilla JavaScript library that adds an accessible, GDPR-compliant cookie consent…

1 hour ago

Q1 2026 Ransomware Attacks Hit 2,122 Organizations Worldwide

The ransomware landscape is shifting from a chaotic swarm of minor players into a highly…

1 hour ago

Michigan DNR adds two water-scooping planes ahead of wildfire season

GAYLORD, MI (WOWO) The Michigan Department of Natural Resources has added two water-scooping aircraft to…

2 hours ago

Michigan Economic Development Corporation under pressure following fraud allegations

LANSING, MI (WOWO) Former criminal charges filed against a Michigan Economic Development Corporation board member…

2 hours ago

Windows BitLocker 0-Day Vulnerability Enables Access to Encrypted Drives

Two new unpatched Windows BitLocker zero-day vulnerabilities significantly compromise Microsoft’s ecosystem. The exploits include a…

2 hours ago

Elkhart County crews work to repair damaged gas main after evacuation order

ELKHART COUNTY, IND. (WOWO) A gas leak prompted evacuations Wednesday morning in an Elkhart County…

2 hours ago

This website uses cookies.