Cloudflare Disrupts Phishing Campaign Targeting Ukrainian Entities
On Thursday, Cloudflare announced that it has taken measures to disrupt an extensive phishing campaign that has been ongoing for a month. This operation is attributed to a Russia-aligned threat actor known as FlyingYeti, which has specifically targeted Ukraine amidst ongoing tensions in the region.
According to a report released by Cloudflare’s threat intelligence team, Cloudforce One, the FlyingYeti campaign exploited fears related to the potential loss of housing and utilities. By leveraging these anxieties, the group encouraged victims to download malicious files packaged within debt-related lures. If these files are opened, they deploy a PowerShell malware variant known as COOKBOX, facilitating further exploitation of the victim’s system.
FlyingYeti is used as the designation by Cloudflare for tracking the activities of this threat actor, which the Computer Emergency Response Team of Ukraine (CERT-UA) has been categorizing under the name UAC-0149. The involvement of this group highlights the increasing sophistication and focus of cyber threats aimed at Ukrainian military and governmental entities.
The latest phase of this campaign, detected in mid-April 2024, exploits a vulnerability in the popular file compression software, WinRAR, identified as CVE-2023-38831. The attackers reportedly utilized Cloudflare Workers and GitHub to stage their operations, signaling a shift toward more robust cloud-based targeting methods.
Targets received phishing emails suggesting debt-related actions, which lured them to a now-removed GitHub page designed to impersonate the legitimate Kyiv Komunalka website. Victims were instructed to download what appeared to be a Microsoft Word document. However, this action triggered the retrieval of a RAR archive that, upon execution, weaponized the aforementioned WinRAR vulnerability to unleash the COOKBOX malware.
Once installed, COOKBOX establishes persistence on the compromised device, enabling it to maintain a foothold for future attacks. The malware communicates with a dynamic DNS domain for command and control, allowing the attackers to issue further PowerShell commands to the infected system.
This notification follows CERT-UA’s recent warnings regarding a surge in phishing campaigns orchestrated by financially motivated groups, including UAC-0006. These campaigns have been linked to the deployment of SmokeLoader malware, which often serves as a precursor for other sophisticated threats, showcasing the interconnected nature of cybercriminal activities.
The ongoing situation highlights broader concerns regarding the evolution of cyber threats linked to geopolitical tensions, with advanced persistent threat (APT) groups increasingly refining their tactics. Recent reports from security firms indicate that these organizations leverage spear-phishing methods to gather data and credentials, delivering a range of malware, including Agent Tesla and Remcos.
The implications of these cyber threats underscore the vital need for organizations to fortify their cybersecurity defenses against persistent phishing attacks and related exploits. Leveraging frameworks such as the MITRE ATT&CK Matrix can help organizations identify applicable tactics and techniques, such as initial access and persistence methods, that adversaries are employing in these sophisticated attacks. As the landscape of cyber threats continues to evolve, maintaining vigilance and robust security protocols will be essential for mitigating risks and protecting valuable assets.