openthreatner / conll /text_27.conll
priamai's picture
Experimental files
8543b6e verified
CYBER O
O
THREAT O
O
ANALYSIS O
O
RUSSIA O
O
By O
Insikt O
Group O
® O
O
February O
17 O
, O
2024 O
O
Russia O
- O
Aligned O
TAG-70 O
O
Targets O
European O
Government O
O
and O
Military O
Mail O
Servers O
in O
O
New O
Espionage O
Campaign O
O
CYBER O
THREAT O
ANALYSIS O
O
Note O
: O
The O
analysis O
cut O
- O
off O
date O
for O
this O
report O
was O
December O
11 O
, O
2023 O
. O
O
Executive O
Summary O
O
Recorded O
Future O
s O
Insikt O
Group O
® O
has O
observed O
TAG-70 O
leveraging O
cross O
- O
site O
scripting O
( O
XSS O
) O
O
vulnerabilities O
against O
Roundcube O
webmail O
servers O
in O
Europe O
, O
targeting O
government O
, O
military O
, O
and O
O
national O
infrastructure O
- O
related O
entities O
. O
TAG-70 O
overlaps O
with O
activity O
reported O
by O
other O
security O
O
vendors O
under O
the O
aliases O
Winter O
Vivern O
, O
TA473 O
, O
and O
UAC-0114 O
. O
The O
group O
likely O
conducts O
O
cyber O
- O
espionage O
campaigns O
to O
serve O
the O
interests O
of O
Belarus O
and O
Russia O
and O
has O
been O
active O
since O
at O
O
least O
December O
2020 O
, O
primarily O
targeting O
governments O
in O
Europe O
and O
Central O
Asia O
. O
O
In O
their O
latest O
campaign O
, O
TAG-70 O
likely O
started O
exploiting O
Roundcube O
webmail O
servers O
at O
the O
beginning O
O
of O
October O
2023 O
and O
continued O
until O
at O
least O
mid O
- O
October O
. O
Insikt O
Group O
detected O
at O
least O
80 O
O
organizations O
targeted O
in O
this O
campaign O
; O
the O
victims O
were O
primarily O
entities O
in O
Georgia O
, O
Poland O
, O
and O
O
Ukraine O
. O
This O
campaign O
has O
been O
linked O
to O
additional O
TAG-70 O
activity O
against O
Uzbekistan O
government O
O
mail O
servers O
, O
which O
involved O
infrastructure O
reported O
by O
Insikt O
Group O
in O
February O
2023 O
. O
O
TAG-70 O
s O
targeting O
of O
Roundcube O
webmail O
servers O
is O
only O
the O
most O
recent O
instance O
of O
targeting O
email O
O
software O
attributed O
to O
Russia O
- O
aligned O
threat O
actor O
groups O
. O
In O
June O
2023 O
, O
Insikt O
Group O
discovered O
that O
O
the O
Russian O
state O
- O
sponsored O
cyber O
- O
espionage O
group O
BlueDelta O
( O
APT28 O
, O
Fancy O
Bear O
) O
was O
targeting O
O
vulnerable O
Roundcube O
installations O
across O
Ukraine O
and O
had O
previously O
exploited O
CVE-2023 O
- O
23397 O
, O
a O
O
critical O
zero O
- O
day O
vulnerability O
in O
Microsoft O
Outlook O
in O
2022 O
. O
Other O
well O
- O
known O
Russian O
threat O
actor O
O
groups O
, O
such O
as O
Sandworm O
and O
BlueBravo O
( O
APT29 O
, O
Midnight O
Blizzard O
) O
, O
have O
also O
previously O
targeted O
O
email O
solutions O
in O
various O
campaigns O
( O
1 O
, O
2 O
, O
3 O
) O
. O
O
In O
the O
context O
of O
the O
ongoing O
war O
in O
Ukraine O
, O
compromised O
email O
servers O
may O
expose O
sensitive O
O
information O
regarding O
Ukraine O
s O
war O
effort O
and O
planning O
, O
its O
relationships O
and O
negotiations O
with O
its O
O
partner O
countries O
as O
it O
seeks O
additional O
military O
and O
economic O
assistance O
, O
expose O
third O
parties O
O
cooperating O
with O
the O
Ukrainian O
government O
privately O
, O
and O
reveal O
fissures O
within O
the O
coalition O
supporting O
O
Ukraine O
. O
Furthermore O
, O
the O
targeting O
of O
the O
Iranian O
embassies O
in O
Russia O
and O
the O
Netherlands O
may O
be O
O
linked O
to O
a O
desire O
to O
assess O
Iran O
's O
current O
diplomatic O
activities O
and O
foreign O
policy O
, O
especially O
as O
Russia O
O
continues O
to O
rely O
on O
Iran O
- O
provided O
weapons O
in O
Ukraine O
. O
Espionage O
against O
the O
Georgian O
Embassy O
in O
O
Sweden O
and O
the O
Georgian O
Ministry O
of O
Defence O
is O
likely O
to O
have O
similar O
foreign O
policy O
- O
oriented O
O
motivations O
, O
particularly O
as O
Georgia O
renewed O
its O
aspirations O
for O
European O
Union O
( O
EU O
) O
membership O
and O
O
North O
Atlantic O
Treaty O
Organization O
( O
NATO O
) O
accession O
following O
Russia O
s O
invasion O
of O
Ukraine O
in O
early O
O
2022 O
. O
O
Organizations O
can O
mitigate O
the O
risk O
of O
compromise O
in O
TAG-70 O
s O
Roundcube O
campaign O
by O
ensuring O
that O
O
Roundcube O
installations O
are O
patched O
and O
up O
- O
to O
- O
date O
, O
as O
well O
as O
by O
blocking O
and O
hunting O
for O
indicators O
O
of O
compromise O
( O
IoCs O
) O
in O
their O
environments O
( O
for O
a O
list O
of O
relevant O
IoCs O
, O
see O
Appendix O
A O
) O
. O
O
Insikt O
Group O
followed O
responsible O
disclosure O
procedures O
in O
advance O
of O
this O
publication O
per O
Recorded O
O
Future O
's O
notification O
policy O
. O
O
1 O
O
CTA O
- O
RU-2024 O
- O
0217 O
O
Recorded O
Future O
® O
| O
www.recordedfuture.com O
O
CYBER O
THREAT O
ANALYSIS O
O
Key O
Findings O
O
O
O
O
O
O
O
O
O
O
O
TAG-70 O
s O
espionage O
campaign O
targeted O
European O
government O
and O
military O
mail O
servers O
. O
The O
O
campaign O
has O
been O
active O
since O
at O
least O
December O
2020 O
, O
primarily O
focusing O
on O
European O
and O
O
Central O
Asian O
governments O
. O
TAG-70 O
employs O
advanced O
techniques O
and O
tools O
, O
indicating O
that O
a O
O
well O
- O
funded O
and O
skilled O
threat O
actor O
is O
behind O
the O
operation O
. O
O
TAG-70 O
has O
demonstrated O
a O
high O
level O
of O
sophistication O
in O
its O
attack O
methods O
. O
The O
threat O
actors O
O
leveraged O
social O
engineering O
techniques O
and O
exploited O
cross O
- O
site O
scripting O
vulnerabilities O
in O
O
Roundcube O
webmail O
servers O
to O
gain O
unauthorized O
access O
to O
targeted O
mail O
servers O
, O
bypassing O
the O
O
defenses O
of O
government O
and O
military O
organizations O
. O
O
By O
infiltrating O
mail O
servers O
, O
TAG-70 O
aims O
to O
collect O
intelligence O
on O
European O
political O
and O
military O
O
activities O
, O
possibly O
to O
gain O
strategic O
advantages O
or O
undermine O
European O
security O
and O
alliances O
. O
O
The O
campaign O
's O
intended O
victims O
indicate O
that O
it O
has O
been O
conducted O
to O
serve O
the O
interests O
of O
O
Belarus O
and O
Russia O
. O
O
This O
TAG-70 O
campaign O
has O
had O
a O
significant O
impact O
, O
as O
the O
malware O
may O
have O
intruded O
into O
email O
O
servers O
in O
multiple O
European O
countries O
, O
including O
Georgia O
, O
Poland O
, O
and O
Ukraine O
. O
Additionally O
, O
O
Insikt O
Group O
detected O
TAG-70 O
targeting O
Iran O
s O
embassies O
in O
Russia O
and O
the O
Netherlands O
, O
which O
is O
O
notable O
given O
Iran O
s O
support O
of O
Russia O
s O
war O
effort O
in O
Ukraine O
. O
TAG-70s O
actions O
highlight O
the O
O
widespread O
nature O
of O
the O
campaign O
and O
its O
implications O
for O
national O
security O
. O
O
TAG-70 O
s O
ability O
to O
compromise O
mail O
servers O
poses O
a O
significant O
risk O
, O
as O
it O
enables O
the O
theft O
of O
O
sensitive O
information O
and O
manipulation O
of O
communication O
channels O
. O
O
Background O
O
In O
February O
2023 O
, O
CERT O
- O
UA O
reported O
details O
of O
TAG-70 O
activity O
in O
which O
the O
threat O
actors O
created O
a O
O
spoofed O
website O
of O
the O
Ministry O
of O
Foreign O
Affairs O
of O
Ukraine O
. O
The O
site O
lured O
users O
to O
download O
O
malicious O
software O
for O
" O
scanning O
infected O
PCs O
for O
viruses O
" O
. O
O
Insikt O
Group O
detected O
TAG-70 O
conducting O
website O
impersonation O
attacks O
in O
February O
2023 O
. O
In O
this O
O
activity O
, O
TAG-70 O
appended O
a O
domain O
with O
legitimate O
domains O
of O
multiple O
Eastern O
European O
government O
O
websites O
to O
deliver O
script O
- O
based O
malware O
. O
O
In O
March O
2023 O
, O
Proofpoint O
reported O
a O
new O
campaign O
in O
which O
TAG-70 O
exploited O
publicly O
facing O
Zimbra O
O
webmail O
portals O
via O
CVE-2022 O
- O
27926 O
. O
This O
activity O
aimed O
to O
gain O
access O
to O
the O
emails O
of O
military O
, O
O
government O
, O
and O
diplomatic O
organizations O
across O
Europe O
involved O
in O
the O
Russia O
- O
Ukraine O
War O
. O
O
Recorded O
Future O
highlighted O
TAG-70 O
domain O
registrations O
and O
suspected O
phishing O
lure O
material O
linked O
to O
O
these O
domains O
in O
April O
2023 O
. O
O
On O
October O
25 O
, O
2023 O
, O
ESET O
detailed O
an O
XSS O
zero O
- O
day O
CVE-2023 O
- O
5631 O
, O
used O
by O
TAG-70 O
to O
exploit O
O
vulnerable O
Roundcube O
webmail O
servers O
. O
The O
vulnerability O
enabled O
the O
attackers O
to O
list O
and O
exfiltrate O
O
2 O
O
CTA O
- O
RU-2024 O
- O
0217 O
O
Recorded O
Future O
® O
| O
www.recordedfuture.com O
O
CYBER O
THREAT O
ANALYSIS O
O
content O
from O
victims O
' O
mailboxes O
with O
no O
interaction O
from O
the O
victim O
required O
other O
than O
opening O
an O
O
infected O
email O
. O
O
Threat O
Analysis O
O
Beginning O
March O
16 O
, O
2023 O
, O
Insikt O
Group O
used O
Recorded O
Future O
Network O
Intelligence O
to O
detect O
suspicious O
O
activity O
from O
a O
victim O
IP O
address O
belonging O
to O
the O
Center O
for O
Economic O
Research O
and O
Reforms O
of O
O
Uzbekistan O
. O
The O
victim O
IP O
address O
was O
observed O
communicating O
with O
the O
domain O
bugiplaysec[.]com O
O
over O
TCP O
port O
443 O
, O
which O
at O
the O
time O
resolved O
to O
IP O
address O
176.97.66[.]57 O
. O
This O
data O
was O
then O
likely O
O
relayed O
to O
command O
and O
control O
( O
C2 O
) O
IP O
address O
198.50.170[.]72 O
on O
TCP O
port O
7662 O
. O
It O
is O
suspected O
that O
O
TAG-70 O
administered O
198.50.170[.]72 O
via O
Tor O
, O
as O
shown O
in O
Figure O
1 O
. O
CERT O
- O
UA O
attributed O
the O
domain O
O
bugiplaysec[.]com O
to O
TAG-70 O
in O
February O
2023 O
. O
O
Insikt O
Group O
observed O
similar O
activity O
between O
an O
IP O
address O
registered O
to O
the O
Embassy O
of O
the O
Republic O
O
of O
Uzbekistan O
in O
Ukraine O
and O
a O
previously O
reported O
C2 O
domain O
, O
ocsp O
- O
reloads[.]com O
, O
which O
resolved O
to O
O
IP O
address O
38.180.2[.]23 O
. O
This O
additional O
C2 O
likely O
forwarded O
the O
data O
it O
received O
to O
IP O
address O
O
86.105.18[.]113 O
on O
TCP O
port O
1194 O
and O
TAG-70 O
likely O
connected O
to O
the O
C2 O
via O
Tor O
, O
also O
shown O
in O
Figure O
1 O
. O
O
Figure O
1 O
: O
TAG-70 O
operational O
infrastructure O
in O
March O
2023 O
( O
Source O
: O
Recorded O
Future O
) O
O
Malware O
Analysis O
O
On O
July O
27 O
, O
2023 O
, O
a O
new O
TAG-70 O
domain O
, O
hitsbitsx[.]com O
, O
resolved O
to O
IP O
address O
176.97.66[.]57 O
. O
Insikt O
O
Group O
also O
detected O
this O
domain O
in O
a O
JavaScript O
- O
based O
malware O
sample O
uploaded O
to O
a O
malware O
O
repository O
, O
shown O
in O
Figure O
2 O
: O
SHA256 O
: O
O
ea22b3e9ecdfd06fae74483deb9ef0245aefdc72f99120ae6525c0eaf37de32e O
. O
O
The O
discovered O
JavaScript O
malware O
matches O
the O
second O
- O
stage O
loader O
used O
in O
TAG-70 O
s O
previous O
O
Roundcube O
exploitation O
described O
by O
ESET O
. O
This O
JavaScript O
is O
loaded O
via O
XSS O
from O
a O
malicious O
email O
O
and O
is O
used O
to O
decode O
a O
Base64 O
- O
encoded O
JavaScript O
payload O
( O
jsBodyBase64 O
) O
. O
The O
payload O
is O
then O
O
inserted O
into O
the O
Document O
Object O
Model O
( O
DOM O
) O
of O
the O
Roundcube O
webpage O
within O
a O
newly O
created O
O
3 O
O
CTA O
- O
RU-2024 O
- O
0217 O
O
Recorded O
Future O
® O
| O
www.recordedfuture.com O
O
CYBER O
THREAT O
ANALYSIS O
O
script O
tag O
. O
O
Figure O
2 O
: O
Second O
- O
stage O
JavaScript O
loader O
( O
Source O
: O
Recorded O
Future O
) O
O
The O
content O
of O
the O
JavaScript O
payload O
, O
jsBodyBase64 O
, O
shown O
in O
Figure O
3 O
, O
suggests O
the O
actors O
were O
O
targeting O
the O
Georgian O
Ministry O
of O
Defence O
domain O
mail[.]mod[.]gov[.]ge O
. O
The O
structure O
of O
this O
payload O
O
overlaps O
with O
the O
one O
described O
in O
ESET O
s O
report O
; O
however O
, O
its O
functionality O
differs O
: O
instead O
of O
exfiltrating O
O
the O
contents O
of O
the O
victim O
s O
mailbox O
, O
it O
logs O
the O
user O
out O
of O
Roundcube O
and O
presents O
them O
with O
a O
new O
O
sign O
- O
in O
window O
. O
When O
the O
victim O
submits O
their O
credentials O
, O
their O
account O
name O
, O
username O
, O
and O
O
password O
are O
sent O
to O
the O
C2 O
server O
, O
and O
they O
are O
then O
logged O
into O
Roundcube O
. O
O
4 O
O
CTA O
- O
RU-2024 O
- O
0217 O
O
Recorded O
Future O
® O
| O
www.recordedfuture.com O
O
CYBER O
THREAT O
ANALYSIS O
O
Figure O
3 O
: O
Abbreviated O
decoded O
Base64 O
JavaScript O
payload O
containing O
C2 O
domain O
, O
victim O
mail O
server O
, O
and O
credential O
exfiltration O
O
code O
( O
Source O
: O
Recorded O
Future O
) O
O
Insikt O
Group O
also O
identified O
a O
related O
JavaScript O
sample O
from O
November O
2022 O
: O
SHA256 O
: O
O
6800357ec3092c56aab17720897c29bb389f70cb49223b289ea5365314199a26 O
. O
This O
older O
sample O
O
was O
hosted O
on O
the O
domain O
bugiplaysec[.]com O
, O
used O
the O
same O
JavaScript O
loader O
technique O
, O
and O
had O
a O
O
similar O
credential O
exfiltration O
payload O
. O
The O
content O
within O
the O
payload O
suggests O
that O
it O
was O
used O
to O
O
target O
the O
Ukrainian O
Ministry O
of O
Defence O
, O
as O
shown O
in O
Figure O
4 O
. O
O
5 O
O
CTA O
- O
RU-2024 O
- O
0217 O
O
Recorded O
Future O
® O
| O
www.recordedfuture.com O
O
CYBER O
THREAT O
ANALYSIS O
O
Figure O
4 O
: O
Abbreviated O
decoded O
Base64 O
JavaScript O
payload O
containing O
C2 O
domain O
, O
victim O
mail O
server O
, O
and O
credential O
exfiltration O
O
code O
from O
JavaScript O
sample O
from O
November O
2022 O
( O
Source O
: O
urlscan O
) O
O
6 O
O
CTA O
- O
RU-2024 O
- O
0217 O
O
Recorded O
Future O
® O
| O
www.recordedfuture.com O
O
CYBER O
THREAT O
ANALYSIS O
O
Malicious O
Infrastructure O
Analysis O
O
Hosting O
history O
for O
the O
domain O
hitsbitsx[.]com O
, O
detailed O
in O
Table O
1 O
, O
shows O
that O
on O
September O
25 O
, O
2023 O
, O
O
the O
domain O
was O
moved O
from O
IP O
address O
176.97.66[.]57 O
to O
IP O
address O
38.180.3[.]57 O
. O
O
IP O
Address O
O
Date O
From O
O
Date O
To O
O
176.97.76[.]118 O
O
2023 O
- O
04 O
- O
12 O
O
2023 O
- O
07 O
- O
17 O
O
176.97.66[.]57 O
O
2023 O
- O
07 O
- O
17 O
O
2023 O
- O
09 O
- O
25 O
O
38.180.3[.]57 O
O
2023 O
- O
09 O
- O
25 O
O
Table O
1 O
: O
Hosting O
history O
for O
hitsbitsx[.]com O
( O
Source O
: O
Recorded O
Future O
) O
O
Analysis O
of O
the O
server O
banners O
returned O
from O
38.180.3[.]57 O
showed O
the O
use O
of O
uncommon O
HTTP O
O
banners O
hosted O
on O
TCP O
ports O
80 O
and O
443 O
beginning O
September O
2023 O
. O
IP O
address O
38.180.76[.]31 O
O
returned O
the O
same O
HTTP O
banners O
( O
shown O
in O
Table O
2 O
) O
and O
resides O
on O
the O
same O
autonomous O
system O
, O
O
AS9009 O
. O
O
HTTP O
Server O
Banners O
O
38.180.3[.]57 O
O
Port O
80 O
O
Port O
443 O
O
HTTP/1.1 O
200 O
OK O
O
Server O
: O
nginx/1.25.2 O
O
Date O
: O
< O
REDACTED O
> O
O
Content O
- O
Type O
: O
text O
/ O
html O
O
Content O
- O
Length O
: O
615 O
O
Last O
- O
Modified O
: O
Tue O
, O
15 O
Aug O
2023 O
19:25:11 O
GMT O
O
Connection O
: O
keep O
- O
alive O
O
ETag O
: O
" O
64dbd117 O
- O
267 O
" O
O
Accept O
- O
Ranges O
: O
bytes O
O
HTTP/1.1 O
403 O
Forbidden O
O
Server O
: O
nginx/1.25.2 O
O
Date O
: O
< O
REDACTED O
> O
O
Content O
- O
Type O
: O
text O
/ O
html O
O
Content O
- O
Length O
: O
153 O
O
Connection O
: O
keep O
- O
alive O
O
38.180.76[.]31 O
O
Port O
80 O
O
Port O
443 O
O
HTTP/1.1 O
200 O
OK O
O
Server O
: O
nginx/1.25.2 O
O
Date O
: O
< O
REDACTED O
> O
O
Content O
- O
Type O
: O
text O
/ O
html O
O
Content O
- O
Length O
: O
615 O
O
Last O
- O
Modified O
: O
Tue O
, O
15 O
Aug O
2023 O
19:25:11 O
GMT O
O
Connection O
: O
keep O
- O
alive O
O
ETag O
: O
" O
64dbd117 O
- O
267 O
" O
O
Accept O
- O
Ranges O
: O
bytes O
O
HTTP/1.1 O
403 O
Forbidden O
O
Server O
: O
nginx/1.25.2 O
O
Date O
: O
< O
REDACTED O
> O
O
Content O
- O
Type O
: O
text O
/ O
html O
O
Content O
- O
Length O
: O
153 O
O
Connection O
: O
keep O
- O
alive O
O
Table O
2 O
: O
Server O
banners O
from O
38.180.3[.]57 O
and O
38.180.76[.]31 O
( O
Source O
: O
Recorded O
Future O
) O
O
7 O
O
CTA O
- O
RU-2024 O
- O
0217 O
O
Recorded O
Future O
® O
| O
www.recordedfuture.com O
O
CYBER O
THREAT O
ANALYSIS O
O
The O
domain O
recsecas[.]com O
resolved O
to O
38.180.76[.]31 O
from O
late O
September O
2023 O
and O
was O
used O
in O
O
TAG-70 O
s O
exploitation O
of O
Roundcube O
webmail O
servers O
, O
as O
reported O
by O
ESET O
in O
October O
2023 O
. O
Previously O
, O
O
in O
June O
2023 O
, O
the O
domain O
resolved O
to O
IP O
address O
176.97.76[.]129 O
. O
Historical O
server O
banners O
for O
O
176.97.76[.]129 O
were O
similar O
to O
those O
detailed O
in O
Table O
2 O
, O
with O
the O
exception O
that O
TCP O
port O
80 O
was O
also O
O
returning O
an O
HTTP O
403 O
Forbidden O
page O
in O
addition O
to O
TCP O
port O
443 O
. O
O
During O
the O
aforementioned O
Roundcube O
campaign O
, O
TAG-70 O
used O
an O
infrastructure O
configuration O
similar O
to O
O
the O
one O
detected O
by O
Recorded O
Future O
in O
March O
( O
Figure O
1 O
) O
. O
However O
, O
Insikt O
Group O
identified O
a O
second O
C2 O
O
server O
within O
the O
Roundcube O
relay O
chain O
, O
which O
utilized O
TCP O
port O
443 O
( O
as O
shown O
in O
Figure O
5 O
) O
rather O
than O
O
a O
static O
high O
ephemeral O
port O
. O
As O
in O
the O
March O
campaign O
, O
Recorded O
Future O
observed O
TAG-70 O
O
communicating O
with O
the O
upstream O
C2 O
via O
Tor O
to O
obfuscate O
their O
true O
location O
. O
O
Figure O
5 O
: O
TAG-70 O
operational O
infrastructure O
in O
October O
2023 O
( O
Source O
: O
ESET O
& O
Recorded O
Future O
) O
O
In O
this O
campaign O
, O
TAG-70 O
began O
exploiting O
Roundcube O
webmail O
servers O
at O
the O
beginning O
of O
October O
O
2023 O
and O
continued O
until O
at O
least O
mid O
- O
October O
. O
Recorded O
Future O
detected O
TAG-70 O
targeting O
at O
least O
80 O
O
separate O
organizations O
, O
primarily O
focusing O
on O
entities O
in O
Ukraine O
, O
Georgia O
, O
and O
Poland O
, O
as O
shown O
in O
O
Figure O
6 O
. O
O
Notably O
, O
there O
were O
some O
victims O
outside O
of O
these O
countries O
, O
such O
as O
the O
Embassy O
of O
Iran O
in O
Moscow O
, O
O
the O
Embassy O
of O
Iran O
in O
the O
Netherlands O
, O
and O
the O
Embassy O
of O
Georgia O
in O
Sweden O
. O
O
8 O
O
CTA O
- O
RU-2024 O
- O
0217 O
O
Recorded O
Future O
® O
| O
www.recordedfuture.com O
O
CYBER O
THREAT O
ANALYSIS O
O
Figure O
6 O
: O
Geographic O
spread O
of O
victims O
of O
TAG-70s O
Roundcube O
exploit O
in O
October O
2023 O
( O
Source O
: O
Recorded O
Future O
) O
O
TAG-70 O
predominantly O
targeted O
government O
and O
military O
webmail O
servers O
; O
however O
, O
the O
group O
also O
O
targeted O
the O
transport O
and O
education O
sectors O
along O
with O
chemical O
and O
biological O
research O
O
organizations O
, O
as O
shown O
in O
Figure O
7 O
. O
O
9 O
O
CTA O
- O
RU-2024 O
- O
0217 O
O
Recorded O
Future O
® O
| O
www.recordedfuture.com O
O
CYBER O
THREAT O
ANALYSIS O
O
Figure O
7 O
: O
Spread O
of O
victim O
industries O
targeted O
in O
TAG-70 O
s O
Roundcube O
exploitation O
campaign O
October O
2023 O
( O
Source O
: O
Recorded O
O
Future O
) O
O
Figure O
8 O
: O
TAG-70 O
s O
October O
2023 O
Roundcube O
exploitation O
campaign O
attack O
flow O
( O
Source O
: O
Recorded O
Future O
) O
O
10 O
O
CTA O
- O
RU-2024 O
- O
0217 O
O
Recorded O
Future O
® O
| O
www.recordedfuture.com O
O
CYBER O
THREAT O
ANALYSIS O
O
Mitigations O
O
O
O
O
O
O
O
O
O
O
O
O
O
Strengthen O
Email O
Security O
Measures O
: O
Implement O
advanced O
email O
security O
solutions O
, O
such O
as O
O
multi O
- O
factor O
authentication O
, O
encryption O
, O
and O
secure O
email O
gateways O
, O
to O
protect O
mail O
servers O
from O
O
unauthorized O
access O
and O
data O
breaches O
. O
O
Conduct O
Regular O
Security O
Audits O
: O
Regularly O
audit O
mail O
servers O
to O
identify O
vulnerabilities O
, O
O
misconfigurations O
, O
and O
potential O
entry O
points O
for O
attackers O
. O
Address O
any O
identified O
weaknesses O
O
promptly O
to O
minimize O
the O
risk O
of O
exploitation O
. O
O
Employee O
Awareness O
Training O
: O
Provide O
comprehensive O
training O
on O
email O
security O
best O
practices O
, O
O
including O
identifying O
phishing O
emails O
, O
suspicious O
attachments O
, O
and O
links O
. O
Regularly O
reinforce O
O
training O
to O
maintain O
a O
high O
level O
of O
awareness O
and O
vigilance O
. O
O
Implement O
Network O
Segmentation O
: O
Separate O
mail O
servers O
from O
other O
critical O
systems O
by O
O
implementing O
network O
segmentation O
. O
This O
practice O
limits O
the O
lateral O
movement O
of O
threats O
, O
O
preventing O
a O
single O
compromised O
system O
from O
compromising O
the O
entire O
network O
. O
O
Collaborate O
with O
Security O
Vendors O
and O
Intelligence O
Agencies O
: O
Establish O
partnerships O
with O
O
reputable O
security O
vendors O
and O
intelligence O
agencies O
to O
leverage O
their O
expertise O
and O
threat O
O
intelligence O
. O
Regularly O
exchange O
information O
on O
emerging O
threats O
and O
indicators O
of O
compromise O
O
to O
enhance O
proactive O
defense O
measures O
. O
O
Develop O
Incident O
Response O
Plans O
: O
Create O
comprehensive O
incident O
response O
plans O
that O
outline O
O
clear O
protocols O
for O
detecting O
, O
responding O
to O
, O
and O
recovering O
from O
security O
incidents O
. O
Regularly O
O
test O
and O
refine O
these O
plans O
through O
simulated O
exercises O
to O
ensure O
an O
effective O
response O
in O
O
real O
- O
world O
scenarios O
. O
O
Outlook O
O
This O
latest O
campaign O
by O
Belarus O
and O
Russia O
- O
aligned O
TAG-70 O
, O
which O
targets O
European O
government O
and O
O
military O
- O
owned O
email O
servers O
, O
suggests O
a O
long O
- O
term O
strategic O
interest O
in O
gathering O
intelligence O
regarding O
O
the O
war O
in O
Ukraine O
and O
the O
evolving O
foreign O
policies O
of O
regional O
powers O
. O
Belarus O
and O
Russia O
- O
aligned O
O
cyber O
- O
espionage O
groups O
will O
almost O
certainly O
continue O
, O
if O
not O
expand O
, O
targeting O
webmail O
software O
O
platforms O
, O
including O
Roundcube O
, O
while O
the O
conflict O
in O
Ukraine O
continues O
and O
while O
tensions O
with O
the O
EU O
O
and O
NATO O
remain O
high O
. O
O
11 O
O
CTA O
- O
RU-2024 O
- O
0217 O
O
Recorded O
Future O
® O
| O
www.recordedfuture.com O
O
CYBER O
THREAT O
ANALYSIS O
O
Appendix O
A O
O
Indicators O
of O
Compromise O
O
Domains O
: O
O
bugiplaysec[.]com O
O
hitsbitsx[.]com O
O
ocsp O
- O
reloads[.]com O
O
recsecas[.]com O
O
IP O
Addresses O
: O
O
38.180.2[.]23 O
O
38.180.3[.]57 O
O
38.180.76[.]31 O
O
86.105.18[.]113 O
O
176.97.66[.]57 O
O
176.97.76[.]118 O
O
176.97.76[.]129 O
O
198.50.170[.]72 O
O
Malware O
Samples O
( O
SHA256 O
): O
O
6800357ec3092c56aab17720897c29bb389f70cb49223b289ea5365314199a26 O
O
ea22b3e9ecdfd06fae74483deb9ef0245aefdc72f99120ae6525c0eaf37de32e O
O
Appendix O
B O
O
MITRE O
ATT&CK O
Techniques O
O
Tactic O
: O
Technique O
O
ATT&CK O
Code O
O
Initial O
Access O
: O
Phishing O
O
T1566 O
O
Execution O
: O
Exploitation O
for O
Client O
Execution O
O
T1203 O
O
Persistence O
: O
Valid O
Accounts O
O
T1078 O
O
Credential O
Access O
: O
Exploitation O
for O
Credential O
Access O
O
T1212 O
O
Credential O
Access O
: O
Input O
Capture O
O
T1056 O
O
Discovery O
: O
File O
and O
Directory O
Discovery O
O
T1083 O
O
Collection O
: O
Email O
Collection O
O
T1114 O
O
Command O
and O
Control O
: O
Non O
- O
Standard O
Port O
O
T1571 O
O
12 O
O
CTA O
- O
RU-2024 O
- O
0217 O
O
Recorded O
Future O
® O
| O
www.recordedfuture.com O
O
CYBER O
THREAT O
ANALYSIS O
O
Appendix O
C O
O
Diamond O
Model O
of O
Intrusion O
Analysis O
O
13 O
O
CTA O
- O
RU-2024 O
- O
0217 O
O
Recorded O
Future O
® O
| O
www.recordedfuture.com O
O
CYBER O
THREAT O
ANALYSIS O
O
About O
Insikt O
Group O
® O
O
Recorded O
Future O
s O
Insikt O
Group O
, O
the O
company O
s O
threat O
research O
division O
, O
comprises O
O
analysts O
and O
security O
researchers O
with O
deep O
government O
, O
law O
enforcement O
, O
military O
, O
and O
O
intelligence O
agency O
experience O
. O
Their O
mission O
is O
to O
produce O
intelligence O
that O
reduces O
risk O
O
for O
clients O
, O
enables O
tangible O
outcomes O
, O
and O
prevents O
business O
disruption O
. O
O
About O
Recorded O
Future O
® O
O
Recorded O
Future O
is O
the O
world O
s O
largest O
threat O
intelligence O
company O
. O
Recorded O
Future O
s O
O
Intelligence O
Cloud O
provides O
end O
- O
to O
- O
end O
intelligence O
across O
adversaries O
, O
infrastructure O
, O
O
and O
targets O
. O
Indexing O
the O
internet O
across O
the O
open O
web O
, O
dark O
web O
, O
and O
technical O
O
sources O
, O
Recorded O
Future O
provides O
real O
- O
time O
visibility O
into O
an O
expanding O
attack O
surface O
O
and O
threat O
landscape O
, O
empowering O
clients O
to O
act O
with O
speed O
and O
confidence O
to O
reduce O
O
risk O
and O
securely O
drive O
business O
forward O
. O
Headquartered O
in O
Boston O
with O
offices O
and O
O
employees O
around O
the O
world O
, O
Recorded O
Future O
works O
with O
over O
1,700 O
businesses O
and O
O
government O
organizations O
across O
more O
than O
75 O
countries O
to O
provide O
real O
- O
time O
, O
unbiased O
, O
O
and O
actionable O
intelligence O
. O
O
Learn O
more O
at O
recordedfuture.com O
O
14 O
O
CTA O
- O
RU-2024 O
- O
0217 O
O
Recorded O
Future O
® O
| O
www.recordedfuture.com O