In a significant cyber espionage campaign attributed to Russian entities, hackers have been actively targeting Kazakhstan to harvest economic and political intelligence. This operation is believed to be orchestrated by the cyber group UAC-0063, considered to overlap with the notorious APT28, linked to Russia's military intelligence, the GRU. This group, also known under various aliases such as Fancy Bear and Sofacy, was initially identified by Ukraine's CERT-UA in early 2023.
Targeting Critical Sectors in Central Asia
The particular focus of UAC-0063 seems to be on strategic intelligence collection within sectors such as government, academia, energy, and defense, with a geographic emphasis on regions like Ukraine and Central Asia. The group uses an array of malware tools, including HATVIBE, CHERRYSPY, and STILLARCH, uniquely associated with their operations.
Sophisticated Attack Techniques
Recent attack waves have leveraged genuine Microsoft Office documents from Kazakhstan's Ministry of Foreign Affairs in spear-phishing campaigns. These documents, embedded with malicious macros, initiate a multi-stage infection process labeled "Double-Tap," ultimately deploying the HATVIBE malware. Notably, these macros ingeniously circumvent security measures by employing sophisticated techniques such as embedding the macro code within settings files and executing tasks without typical system alerts. HATVIBE serves as a loader, fetching additional VBS modules from remote servers, leading to the execution of the CHERRYSPY Python backdoor. The infection chain also cleverly avoids detection by manipulating document behavior to escape standard security protocols.
Linkages to Russian Surveillance Efforts
This cyber activity aligns with broader intelligence efforts involving Russia's System for Operative Investigative Activities (SORM). A recent disclosure by Recorded Future highlights that several Central Asian and Latin American countries have acquired SORM technology. Systems like SORM enable comprehensive surveillance capabilities, raising concerns about potential misuse in repressing political dissent and monitoring civil activities. The deployment of these technologies and methods highlights Russia's ongoing attempts to expand its influence across former Soviet territories and beyond, raising significant cybersecurity concerns for targeted regions.
Analyzing Implications
Sekoia's analysis underscores the strategic nature of these cyber operations, revealing substantial technical and operational overlaps with APT28 campaigns. The ability of these attacks to bypass traditional defenses underscores the need for heightened vigilance and advanced threat intelligence solutions to combat such sophisticated cyber threats.