‘Awaken Likho’ Cyberthreat Group Aims at Russian Government Using Sophisticated Techniques

Oct 08, 2024Ravie LakshmananCyber Risk / Advanced Persistent Threat

A continuous operation known as Awaken Likho has been directed towards Russian government agencies and industrial entities.

Cyberattack Group 'Awaken Likho' Targets Russian Government with Advanced Tools

Oct 08, 2024Ravie LakshmananCyber Risk / Advanced Persistent Threat

Cyberattack Group 'Awaken Likho' Targets Russian Government with Advanced Tools

A continuous operation known as Awaken Likho has been directed towards Russian government agencies and industrial entities.

Kaspersky revealed the usage of the MeshCentral platform by the attackers instead of the previously employed UltraVNC module for gaining remote access to systems. This new campaign commenced in June 2024 and persisted at least until August, as per Kaspersky’s statement.

The cyber defense firm specified that the campaign’s primary focus was on Russian government agencies, their suppliers, and industrial firms.

Cybersecurity

Core Werewolf, also identified as Awaken Likho and PseudoGamaredon, was initially observed by BI.ZONE in June 2023, concerning cyber assaults aimed at defense and critical infrastructure areas. This group is assumed to have been active since at least August 2021.

The spear-phishing tactics include the distribution of malicious executables camouflaged as Microsoft Word or PDF files with double extensions like “doc.exe,” “.docx.exe,” or “.pdf.exe,” showing only the initial document format extensions to users.

Upon opening these files, the UltraVNC gets installed, granting the threat actors full control over the compromised systems.

Previously, attacks by Core Werewolf had also targeted a Russian military base in Armenia and a Russian institute involved in weapon development, based on the findings by F.A.C.C.T. from May of the same year.

An interesting change in these scenarios is the adoption of a self-extracting archive (SFX) to covertly install UltraVNC while presenting an innocuous bait document to the victims.

Cybersecurity

Kaspersky’s latest discovery indicates an attack chain where an SFX archive file produced using 7-Zip triggers the execution of a file named “MicrosoftStores.exe” when opened, leading to the unpacking of an AutoIt script to ultimately activate the open-source remote management tool MeshAgent.

These tactics enable the APT to remain hidden within the system, with the attackers setting up a scheduled task that launches MeshAgent via a command file, establishing a link with the MeshCentral server, according to Kaspersky.

Find this article intriguing? Follow us on Twitter and LinkedIn for more exclusive content.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.