New Sandworm Attacks Use Trojanized MSFT Activators

In a concerning development for cybersecurity, the Russian state-sponsored threat group known as Sandworm has intensified its campaign against Ukrainian Windows users. Reports from BleepingComputer indicate that since late 2023, Sandworm, which operates under various aliases such as APT44, Seashell Blizzard, and UAC-0113, has executed a series of sophisticated malware intrusions.

Malicious Tactics Unveiled

The latest wave of attacks has seen the deployment of counterfeit Microsoft Key Management Service (KMS) activators and fraudulent Windows updates. An analysis by EclecticIQ reveals that one of the most recent incidents involved the distribution of a deceptive KMS activation tool. This tool was laced with the BACKORDER malware loader, which subsequently enabled the delivery of DarkCrystal RAT after disabling Windows Defender.

DarkCrystal RAT has proven to be particularly insidious, allowing attackers to extract sensitive information from compromised devices. This includes:

  • Saved credentials
  • Browser cookies and histories
  • Keystrokes
  • FTP credentials
  • System details

According to EclecticIQ, the rise of pirated software from untrusted sources has created a fertile ground for adversaries like Sandworm. Many users, including businesses and critical entities, have resorted to these illicit programs, unwittingly providing attackers with the opportunity to embed malware within commonly used applications. This strategy not only facilitates large-scale espionage and data theft but also poses a direct threat to Ukraine’s national security, critical infrastructure, and the resilience of its private sector.

Winsage
New Sandworm Attacks Use Trojanized MSFT Activators