Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Hacker Group ‘Twelve’ Targets Russian Entities with Damaging Cyber Attacks!

Hacker Group ‘Twelve’ Targets Russian Entities with Damaging Cyber Attacks!

A hacktivist group known as ‘Twelve’ has been seen using an array of publicly available tools to conduct destructive cyber-attacks against Russian targets.

“Rather than demand a ransom for decrypting data, Twelve prefers to encrypt victims’ data & then destroy their infrastructure with a wiper to prevent recovery,” Kaspersky said in a Fri. analysis.

“The approach is indicative of a desire to cause maximum damage to target organisations without deriving direct financial benefit.”

Russo-Ukrainian War

The hacking group, thought to have been formed in April 2023 following the onset of the Russo-Ukrainian war, has a record of mounting cyber-attacks that aim to cripple victim networks & disrupt business operations.

It has also been observed conducting hack-&-leak operations that exfiltrate sensitive information, which is then shared on its Telegram channel.

DARKSTAR

Kaspersky outlined that Twelve shares infrastructural & tactical overlaps with a ransomware group called DARKSTAR (aka COMET or Shadow), raising the possibility that the 2 intrusion sets are likely related to one another or part of the same activity cluster.

“At the same time, whereas Twelve’s actions are clearly hacktivist in nature, DARKSTAR sticks to the classic double extortion pattern,” the Russian cyber-security vendor observed. “This variation of objectives within the syndicate underscores the complexity & diversity of modern cyberthreats.”

Remote Desktop Protocol

The attack chains start with gaining initial access by abusing valid local or domain accounts, after which the Remote Desktop Protocol (RDP) is used to facilitate lateral movement. Some of these attacks are also conducted via the victim’s contractors.

“To do this, they gained access to the contractor’s infrastructure & then used its certificate to connect to its customer’s VPN,” Kaspersky noted.

“Having obtained access to that, the adversary can connect to the customer’s systems via the Remote Desktop Protocol (RDP) & then penetrate the customer’s infrastructure.”

Varied Tools

Among the other tools used by Twelve are Cobalt Strike, Mimikatz, Chisel, BloodHound, PowerView, adPEAS, CrackMapExec, Advanced IP Scanner, and PsExec for credential theft, discovery, network mapping, & privilege escalation. The malicious RDP connections to the system are tunnelled through ngrok.

Also used are PHP web shells with capabilities to execute arbitrary commands, move files, or send emails. These programs, such as the WSO web shell, are readily available on GitHub.

Security Vulnerabilities

In one incident investigated by Kaspersky, the threat players are believed to have exploited known security vulnerabilities (e.g., CVE-2021-21972 and CVE-2021-22005) in VMware vCenter to deliver a web shell that then was used to drop a backdoor dubbed FaceFish.

“To gain a foothold in the domain infrastructure, the adversary used PowerShell to add domain users & groups, & to modify ACLs (Access Control Lists) for Active Directory objects,” it commented. “To avoid detection, the attackers disguised their malware & tasks under the names of existing products or services.”

Some of the names used include “Update Microsoft,” “Yandex,” “YandexUpdate,” & “intel.exe.”

PowerShell Script

The attacks are also characterised by the use of a PowerShell script (“Sophos_kill_local.ps1”) to terminate processes related to Sophos security software on the compromised host.

The concluding stages entail using the Windows Task Scheduler to launch ransomware & wiper payloads, but not before gathering & exfiltrating sensitive information about their victims via a file-sharing service called DropMeFiles in the form of ZIP archives.

“The attackers used a version of the popular LockBit 3.0 ransomware, compiled from publicly available source code, to encrypt the data,” Kaspersky researchers explained. “Before starting work, the ransomware terminates processes that may interfere with the encryption of individual files.”

Master Boot Record (MBR)

The wiper, identical to the Shamoon malware, rewrites the master boot record (MBR) on connected drives & overwrites all file contents with randomly generated bytes, effectively preventing system recovery.

“The group sticks to a publicly available & familiar arsenal of malware tools, which suggests it makes none of its own,” Kaspersky noted. “This makes it possible to detect & prevent Twelve’s attacks in due time.”

 

SHARE ARTICLE