Shuckworm组织2025年针对东欧军事使命的新一轮攻击
与俄罗斯相关的间谍组织Shuckworm于2025年继续针对乌克兰及其西方军事盟友发动网络攻击,采用更复杂的PowerShell恶意软件工具,并通过感染移动存储设备作为初始入侵手段。 2025-4-13 00:45:44 Author: cybersecuritynews.com(查看原文) 阅读量:8 收藏

Shuckworm Group Uses PowerShell Based GammaSteel Malware in Targeted Attacks

The Russia-linked espionage group Shuckworm has continued its relentless focus on Ukraine into 2025, with new attacks targeting a Western country’s military mission based in Eastern Europe.

This latest campaign, observed from February through March 2025, represents an evolution in the group’s tactics with a shift toward more sophisticated PowerShell-based malware tools that enhance stealth and persistence capabilities.

Shuckworm, also known as Gamaredon or Armageddon, has been active since 2013 and has almost exclusively targeted Ukrainian government, law enforcement, and defense organizations.

Google News

The initial infection vector in this campaign appears to be infected removable drives, demonstrating the group’s tactical awareness of potential airgapped environments in military settings.

The attackers deployed an updated version of their GammaSteel infostealer, designed to exfiltrate sensitive data from victim networks.

The campaign demonstrates Shuckworm’s move from VBS scripts to predominantly PowerShell-based tools, particularly in later stages of the attack chain.

This tactical shift allows the group to leverage PowerShell for increased obfuscation and provides the capability to store malicious scripts directly in the Windows Registry, reducing their footprint on disk.

Symantec researchers identified a complex, multi-staged attack chain featuring frequent use of obfuscation techniques designed to minimize detection risk.

Analysis of the infection timeline shows that following initial compromise in February, an array of malicious activity occurred on March 1st across multiple machines in the targeted network.

Infection Mechanism and Exfiltration Methods

The attack begins with a malicious LNK file on an external drive, which triggers a chain of events starting with an mshta.exe process executing JavaScript code.

This leads to the execution of heavily obfuscated VBScript files which establish persistence and contact command and control (C&C) servers.

The following code snippet shows how the malware uses PowerShell to capture system information:

[System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms")
$ScreenBounds = [System.Windows.Forms.SystemInformation]::PrimaryMonitorSize;
$w = $ScreenBounds."Width" + 1-1;
$h = $ScreenBounds."Height" + 1-1;

The malware stores its components across multiple Registry values, preventing easy detection and removal.

For data exfiltration, GammaSteel employs multiple methods including PowerShell web requests to Cloudflare-based domains, and as a fallback, cURL with Tor network proxying to mask the origin IP.

The malware specifically targets files with extensions like .doc, .docx, .xls, .pdf, and other document formats, while avoiding system folders containing strings like “windows” or “appdata.”

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Also Read:


文章来源: https://cybersecuritynews.com/shuckworm-group-uses-powershell-based-gammasteel-malware/
如有侵权请联系:admin#unsafe.sh