By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Gamaredon Uses Infected Removable Drives to Breach Western Military Mission in Ukraine
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Gamaredon Uses Infected Removable Drives to Breach Western Military Mission in Ukraine
Computing

Gamaredon Uses Infected Removable Drives to Breach Western Military Mission in Ukraine

News Room
Last updated: 2025/04/10 at 9:57 AM
News Room Published 10 April 2025
Share
SHARE

Apr 10, 2025Ravie LakshmananCyber Espionage / Malware

The Russia-linked threat actor known as Gamaredon (aka Shuckworm) has been attributed to a cyber attack targeting a foreign military mission based in Ukraine with an aim to deliver an updated version of a known malware called GammaSteel.

The group targeted the military mission of a Western country, per the Symantec Threat Hunter team, with first signs of the malicious activity detected on February 26, 2025.

“The initial infection vector used by the attackers appears to have been an infected removable drive,” the Broadcom-owned threat intelligence division said in a report shared with The Hacker News.

Cybersecurity

The attack started with the creation of a Windows Registry value under the UserAssist key, followed by launching “mshta.exe” using “explorer.exe” to initiate a multi-stage infection chain and launch two files.

The first file, named “NTUSER.DAT.TMContainer00000000000000000001.regtrans-ms,” is used to establish communications with a command-and-control (C2) server that’s obtained by reaching out to specific URLs associated with legitimate services like Teletype, Telegram, and Telegraph, among others.

The second file in question, “NTUSER.DAT.TMContainer00000000000000000002.regtrans-ms,” is designed to infect any removable drives and network drives by creating shortcut files for every folder to execute the malicious “mshta.exe” command and hide it.

Subsequently on March 1, 2025, the script was executed to contact a C2 server, exfiltrate system metadata, and receive, in return, a Base64-encoded payload, which is then used to run a PowerShell command engineered to download an obfuscated new version of the same script.

The script, for its part, connects to a hard-coded C2 server to fetch two more PowerShell scripts, the first of which is a reconnaissance utility capable of capturing screenshots, run systeminfo command, get details of security software running on the host, enumerate files and folders in Desktop, and list running processes.

The second PowerShell script is an improved version of GammaSteel, a known information stealer that’s capable of exfiltrating files from a victim based on an extension allowlist from the Desktop and Documents folders.

Cybersecurity

“This attack does mark something of an increase in sophistication for Shuckworm, which appears to be less skilled than other Russian actors, though it compensates for this with its relentless focus on targets in Ukraine,” Symantec said.

“While the group does not appear to have access to the same skill set as some other Russian groups, Shuckworm does now appear to be trying to compensate for this by continually making minor modifications to the code it uses, adding obfuscation, and leveraging legitimate web services, all to try lower the risk of detection.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article The Beats Studio Buds + earbuds are back to their lowest-ever price for a limited time at Amazon
Next Article The official Irobot store has them at the best price
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks
Computing
1968 car pulled from a barn – owner wanted $1 but gearheads saw expensive detail
News
Best Induction Hobs 2025: Cook quickly and efficiently with our expert-tested choices
Gadget
Are we normalising surveillance in schools? | Computer Weekly
News

You Might also Like

Computing

Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks

7 Min Read
Computing

AMD EPYC 4345P 8-Core CPU Performance Review

6 Min Read
Computing

BEYOND Expo 2025: Alibaba Chairman Joe Tsai admits to Chinese tech giant’s “setbacks,” sees AI as key to global growth · TechNode

4 Min Read
Computing

Rams, chickens, and the price of survival

8 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?