Skip to content

Cybercriminals Launch Assault on Ukrainian Weapons Providers

Cybercriminals Employ Strategies to Infiltrate Ukraine's Arms Industry Suppliers

Hackers affiliated with the infamous Russian group Fancy Bear have reportedly focused their...
Hackers affiliated with the infamous Russian group Fancy Bear have reportedly focused their cyberattacks on arms manufacturers supplying weapons to Ukraine. (Photo)

Cybercriminals Attack Ukraine's Weapons Manufacturers - Cybercriminals Launch Assault on Ukrainian Weapons Providers

Rewritten Article:

Fancy Bear: The Persistent Hackers targeting Weapon Suppliers to Ukraine

Let's dive into the latest cybersecurity shenanigans! The notorious Russian hacker group, commonly known as Fancy Bear or Sednit, has been up to no good again. This time, they've set their sights on arms manufacturers supplying weapons to Ukraine, as per a recent study by the Slovak security firm, Eset, based in Bratislava. The main targets have been manufacturers of Soviet-era weaponry in Bulgaria, Romania, and Ukraine, playing a pivotal role in Ukraine's defense against Russia's invasion. Intriguingly, arms factories in Africa and South America have also been in their crosshairs.

Fancy Bear is infamous for variety of cyberattacks, such as the infiltration of the German Bundestag (2015), attempts on US politician Hillary Clinton (2016), and the SPD party headquarters (2023). Security experts suspect that this group forms part of a broader strategy by Russian intelligence services, employing cyberattacks as a tool for political influence and destabilization. Besides espionage, these hackers also focus on targeted disinformation campaigns against Western democracies.

The current spying campaign, christened "Operation RoundPress," revolves around exploiting vulnerable webmail software, like Roundcube, Zimbra, Horde, and MDaemon. It's important to note that many of these vulnerabilities could have been eliminated with regular software maintenance. However, in some cases, the affected companies were helpless as the hackers leveraged a previously unknown security flaw in MDaemon that initially couldn't be patched.

This cyber operation commonly begins with fabricated emails disguised as credible news articles from sources such as the Kyiv Post or the Bulgarian news portal News.bg. Once opened in a browser, hidden malware is triggered, slipping through spam filters unnoticed.

Eset researchers identified the malware "SpyPress.MDAEMON" during their analysis. This hacking program isn't just capable of stealing login credentials and tracking emails; it can also bypass two-factor authentication, a common security measure for accounts and sensitive data online.

In many cases, the hackers from Fancy Bear successfully bypassed two-factor authentication (2FA), gaining permanent access to mailboxes using application passwords. Matthieu Faou, an Eset researcher, stated, "Many companies still operate outdated webmail servers. Just viewing an email in the browser can be enough to execute malware without the recipient taking any action."

  • Cybersecurity
  • Hacker group
  • Ukraine
  • Brutal attacks
  • Arms manufacturers
  • Eastern Europe
  • Africa
  • South America
  • Bundestag
  • Hillary Clinton
  • SPD

Enrichment Data:The Russian hacker group Fancy Bear, also known as APT28 or Sednit, has been carrying out the "Operation RoundPress" campaign. This operation, exploiting cross-site scripting (XSS) vulnerabilities in webmail software like Roundcube, Horde, MDaemon, and Zimbra, employs spear-phishing emails to inject malicious JavaScript code into victims' webmail pages, thereby enabling the theft of webmail credentials, contact exfiltration, and email messages [1][2][3].

One of the significant vulnerabilities targeted was a zero-day in MDaemon, suggesting that Fancy Bear might have developed this capability in-house or acquired it from a third-party vendor [1][3]. Moreover, the group has used payloads like SpyPress.MDAEMON to circumvent two-factor authentication (2FA) mechanisms, aiding unauthorized access to sensitive data.

The targets of this operation comprise Ukrainian governmental entities and defense companies, along with companies in Eastern Europe, Africa, Europe, and South America that supply weapons to Ukraine [2][3]. This cyber campaign has been ongoing since at least September 2023 [4].

  • The Russian hacker group Fancy Bear, infamous for their brutal attacks on political targets and Western democracies, is currently operating a cyber campaign called "Operation RoundPress."
  • This operation targets arms manufacturers in Eastern Europe, Africa, and South America, particularly those supplying weapons to Ukraine, using spear-phishing emails to exploit vulnerabilities in webmail software like Roundcube, Horde, MDaemon, and Zimbra.
  • The hackers in Fancy Bear have been stealing login credentials, tracking emails, and bypassing two-factor authentication in this cyber operation, demonstrating the need for regular software maintenance and vigilance against cyber threats.

Read also:

    Latest