By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Gamaredon Uses Infected Removable Drives to Breach Western Military Mission in Ukraine
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Gamaredon Uses Infected Removable Drives to Breach Western Military Mission in Ukraine
Computing

Gamaredon Uses Infected Removable Drives to Breach Western Military Mission in Ukraine

News Room
Last updated: 2025/04/10 at 9:57 AM
News Room Published 10 April 2025
Share
SHARE

Apr 10, 2025Ravie LakshmananCyber Espionage / Malware

The Russia-linked threat actor known as Gamaredon (aka Shuckworm) has been attributed to a cyber attack targeting a foreign military mission based in Ukraine with an aim to deliver an updated version of a known malware called GammaSteel.

The group targeted the military mission of a Western country, per the Symantec Threat Hunter team, with first signs of the malicious activity detected on February 26, 2025.

“The initial infection vector used by the attackers appears to have been an infected removable drive,” the Broadcom-owned threat intelligence division said in a report shared with The Hacker News.

Cybersecurity

The attack started with the creation of a Windows Registry value under the UserAssist key, followed by launching “mshta.exe” using “explorer.exe” to initiate a multi-stage infection chain and launch two files.

The first file, named “NTUSER.DAT.TMContainer00000000000000000001.regtrans-ms,” is used to establish communications with a command-and-control (C2) server that’s obtained by reaching out to specific URLs associated with legitimate services like Teletype, Telegram, and Telegraph, among others.

The second file in question, “NTUSER.DAT.TMContainer00000000000000000002.regtrans-ms,” is designed to infect any removable drives and network drives by creating shortcut files for every folder to execute the malicious “mshta.exe” command and hide it.

Subsequently on March 1, 2025, the script was executed to contact a C2 server, exfiltrate system metadata, and receive, in return, a Base64-encoded payload, which is then used to run a PowerShell command engineered to download an obfuscated new version of the same script.

The script, for its part, connects to a hard-coded C2 server to fetch two more PowerShell scripts, the first of which is a reconnaissance utility capable of capturing screenshots, run systeminfo command, get details of security software running on the host, enumerate files and folders in Desktop, and list running processes.

The second PowerShell script is an improved version of GammaSteel, a known information stealer that’s capable of exfiltrating files from a victim based on an extension allowlist from the Desktop and Documents folders.

Cybersecurity

“This attack does mark something of an increase in sophistication for Shuckworm, which appears to be less skilled than other Russian actors, though it compensates for this with its relentless focus on targets in Ukraine,” Symantec said.

“While the group does not appear to have access to the same skill set as some other Russian groups, Shuckworm does now appear to be trying to compensate for this by continually making minor modifications to the code it uses, adding obfuscation, and leveraging legitimate web services, all to try lower the risk of detection.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article The Beats Studio Buds + earbuds are back to their lowest-ever price for a limited time at Amazon
Next Article The official Irobot store has them at the best price
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

AI potential ‘squandered by universities’ risk-focused approach’
Software
OnePlus 13 Review: The Rapid Android with a Gorgeous Fabric Back
Software
There is a whole adult book market. And they have their own ration of controversies, demands and plagiarism
Mobile
A new tricolor radar to build muscle Guépard helicopters
Mobile

You Might also Like

Computing

How We Cut Chat UI Frame Time by 8% with One Jetpack Compose Optimization | HackerNoon

18 Min Read
Computing

NVIDIA VA-API Driver 0.0.14 Improves Compatibility & Fixes Various Issues

1 Min Read
Computing

Four Chinese companies plan to build EV-related plants in Indonesia: report · TechNode

1 Min Read
Computing

The Ultimate Guide to Selling on Social Media

5 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?