Gamaredon Deploys GammaDrop and GammaLoad In Phishing Campaigns

Gamaredon Deploys GammaDrop and GammaLoad In Phishing Campaigns
The cyber battlefield in Eastern Europe is escalating once again. Relentless Russian state-sponsored threat actors are weaponizing critical vulnerabilities to paralyze government networks.

Since September 2025, the notorious hacking group Gamaredon has launched over a dozen waves of highly targeted spearphishing attacks against Ukrainian state institutions.

This ongoing campaign shows no signs of slowing down, using heavily disguised emails to quietly infiltrate secure systems.

Known interchangeably as Aqua Blizzard by Microsoft or Shuckworm by various security researchers, the group is aggressively exploiting CVE-2025-8088.

This critical WinRAR directory traversal vulnerability was initially documented by ESET last year.

Now, Gamaredon is actively leveraging the flaw to silently compromise systems using multi-stage VBScript downloaders, specifically identifying their customized malware as GammaDrop and GammaLoad variants.

Gamaredon Deploys Malware Downloaders

The threat actors rely heavily on hijacked government email accounts to mask their malicious activity. By compromising legitimate infrastructure, they spoof emails that appear as official court summons, legal mandates, or military communications.

Because many of these targeted domains lack strict DMARC enforcement, the spoofed emails easily bypass standard security filters and reach the victim’s primary inbox.

Gamaredon Deploys Malware Downloaders (Source: harfanglab)
Gamaredon Deploys Malware Downloaders (Source: harfanglab)

Hidden within these deceptive emails is a weaponized RAR archive. When a victim attempts to open what appears to be a harmless PDF document, the WinRAR vulnerability is triggered immediately.

Through a complex path traversal sequence that abuses NTFS alternate data streams, the archive secretly drops the initial payload, GammaDrop.

The malicious script is planted directly in the Windows Startup folder, ensuring the malware runs automatically every time the infected machine reboots, without requiring any further user interaction.

hxxps://throbsuns2.h4puonhajw.workers[.]dev/<campaign ID>/<URI path>/<date>/<suffix><rand>.<extension>

Historically, Gamaredon has focused intensely on targeting the Security Service of Ukraine (SSU), regional courts, and law enforcement agencies.

By leveraging compromised internet service providers and hijacked domains, they create a highly believable infection chain that catches unsuspecting government employees off guard.

Once executed, the GammaDrop script immediately contacts attacker-controlled Cloudflare Workers to fetch the second-stage payload, GammaLoad.

This heavily obfuscated script profiles the infected machine, silently gathering unique system identifiers, drive serial numbers, and computer names.

hxxps://a.cnbyvilkghx2a6p.workers[.]dev/<random_string>.<random_extension>

It then establishes a persistent connection, acting as a beacon that continuously contacts primary and fallback command-and-control (C2) servers to await further instructions.

Security analysts note that GammaLoad is designed to selectively deliver tailored, destructive payloads based on the victim’s specific profile.

The malware communicates in an infinite loop, hiding its traffic within standard browser user-agent strings.

If the primary Cloudflare-hosted server fails, it seamlessly falls back to heavily fortified Russian domains to maintain control over the compromised system, harfanglab said.

Indicators of Compromise (IOCs)

Indicator TypeValueDescription
SHA-256ecb9609989dce48f78d4fa83abf3dae5592dd4e332d27f005e652c4f82d0b3c2Malicious RAR archive
SHA-25662818ae5e305b89b9461536dac1b9daf4cebd99d24e417357e27e2ae4582a704GammaDrop VBS Payload
SHA-25669cdde1ec82099a471283de89dd5e17266b1d8dda57d3c1589b7754b009fa2edGammaLoad HTA Payload

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post Gamaredon Deploys GammaDrop and GammaLoad In Phishing Campaigns appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Leave a Reply

Your email address will not be published. Required fields are marked *

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading