#Gamaredon

2026-01-19

Gamaredon: Now Downloading via Windows Updates Best Friend “BITS”
#Gamaredon
blog.synapticsystems.de/gamare

2025-12-05

#ESETresearch analyzed the #Gamaredon VBScript payload recently flagged by @ClearskySec. It wipes registry Run keys, scheduled tasks, and kills processes – however, our assessment is that this is likely to clean researchers’ machines, not a shift to destructive ops. x.com/ClearskySec/status/19950
The script is similar to Gamaredon VBScripts we analyzed before. It removes all registry values under well-known Run/RunOnce keys + several legitimate keys commonly abused by Gamaredon. It also deletes all scheduled tasks and terminates PowerShell, VBScript, and Mshta processes.
Gamaredon often stores malicious files with random names in %USERPROFILE%. Instead of pinpointing specific files, the script recursively deletes everything from the C:\Users directory – collateral damage seems acceptable to Gamaredon operators.
This behavior suggests Gamaredon wants to erase traces when uninstalling its malware – most likely due to recognizing researcher environments – not a pivot to destructive activities. Espionage remains their primary goal. virustotal.com/gui/file/9a3942

CyberNetsecIOnetsecio
2025-11-26

📰 Geopolitical Shift: Russian and North Korean State Hackers Found Sharing Attack Infrastructure

‼️ Unprecedented cyber alliance: Russian APT Gamaredon & North Korea's Lazarus Group caught sharing C2 attack infrastructure. The collaboration signals a dangerous escalation in state-sponsored threats. ...

🔗 cyber.netsecops.io/articles/un

2025-11-25

📢 Chevauchement d’infrastructure entre Gamaredon (RU) et Lazarus (KP) détecté par Gen
📝 Selon Gen Blogs (gendigital.com), Threat Research Team, le 19 novembre 2025, de nouveaux éléments indiquent un possible chevauchement d’in...
📖 cyberveille : cyberveille.ch/posts/2025-11-2
🌐 source : gendigital.com/blog/insights/r
#APT #Gamaredon #Cyberveille

The Ukrainian Tribuneuatribune
2025-11-23

Two of the world’s most prolific state-linked groups — ’s and ’s collective — have been spotted sharing resources.

Experts found overlapping and shared between the two groups.

politico.eu/article/russia-nor

ZATAZ - "\o/"zataz@mastox.eu
2025-09-29

// Turla + Gamaredon : alliance inédite entre APT russes

⚠️ Deux groupes APT liés au Kremlin, Turla et Gamaredon, collaborent pour la première fois en Ukraine. Une synergie inquiétante entre cyber-espionnage et sabotage.

🔗 datasecuritybreach.fr/turla-et

#APT #CyberEspionnage #Turla #Gamaredon #Ukraine #zataz @Damien_Bancal

2025-09-26

#ESETresearch has observed #Gamaredon exploiting CVE-2025-8088 (#WinRAR path traversal) in an ongoing spearphishing campaign. This vulnerability allows arbitrary file write via crafted RAR archives.
The same CVE was recently seen exploited in the wild by other groups (e.g., RomCom), and described by ESET Research in a blogpost - welivesecurity.com/en/eset-res
Now, Gamaredon is abusing it to drop malicious payloads via spearphishing lures, targeting Ukrainian governmental entities.
CVE-2025-8088 abuses a flaw in WinRAR’s handling of file paths in RAR archives. By crafting a file with ..\..\ sequences in its ADS, attackers can write files outside the extraction directory, which allows dropping files into the Startup folder.
IoCs:
🚨 VBS/Pterodo.CFC trojan
📄 6DF9312CD3EA11D94A01C4663C07907F6DFC59CB
D23B477B0103AFA8691E9AE9CE50912A2EA50D3B
AC6F459A218532F183004798936BB1A239349C20
0CDC5544413E80F78212E418E7936308A285E8DC
67A99D1D57116CD10B7082814B8CF25EB1FB9007
C8138F1CDD65FB4A3C93A7F7514C0133781FB89B
CDB0F9C6FC4120EFB911F5BB4E801300992BD560
CA0151D9AEE5408F3080CA108FA4EEB2C6785628
4626615651A9CC8CE0FD078DF281CA275D6D28C4
3EA2987D67A16450313E5DCC80C15C956F758486
0FC8B3117692C21A1750473771BCFB5D60CE306A
🌐documents-pdf.serveftp[.]com
document-ua.serveftp[.]com
pdf-download.serveftp[.]com

Ars Technica Newsarstechnica@c.im
2025-09-19

Two of the Kremlin’s most active hack groups are collaborating, ESET says arstechni.ca/NMLz #advancedpersistentthreat #gamaredon #Security #Biz&IT #russia #turla #APT

2025-07-05

📢 Analyse des cyberattaques de Gamaredon contre l'Ukraine en 2024
📝 ESET Research a publié une analyse détaillée des opérations de cyberespionnage menées par le groupe **Gamaredon** en 2024,...
📖 cyberveille : cyberveille.ch/posts/2025-07-0
🌐 source : welivesecurity.com/en/eset-res
#Gamaredon #IOC #Cyberveille

Rene Robichaudnerowild
2025-07-02
2025-07-02

#ESETresearch has conducted a comprehensive technical analysis of new malicious tools and significant updates observed in 2024 in the arsenal of the Russia-aligned #Gamaredon #APTgroup targeting Ukraine🇺🇦. welivesecurity.com/en/eset-res
In 2024, #Gamaredon returned to exclusively targeting Ukrainian governmental institutions, significantly increasing the size and frequency of its #spearphishing campaigns compared to previous years, as shown in the chart.
Besides spearphishing, #Gamaredon continues to use custom malware for lateral movement, weaponizing USB and now also network drives via updated versions of PteroLNK. Additionally, the new tool PteroTickle weaponizes Python apps converted to executables.
The VBScript version of PteroLNK has become the group’s most frequently updated tool. It now weaponizes network drives, hides targeted folders, and creates malicious LNK files using JavaScript executed by mshta.exe.
Gamaredon added stealthier methods to known tools. For example, PteroPSDoor now uses WMI event subscriptions and FileSystemWatcher to quietly monitor files, reducing noisy operations that could alert defenders.
The new tool PteroGraphin implements uncommon persistence via Excel add-ins, creating a hidden channel for payload delivery through Telegraph. Later, Gamaredon simplified its persistence, relying instead on scheduled tasks alone.
Another notable addition is PteroBox, a new PowerShell-based file stealer that exfiltrates files to Dropbox. It prioritizes sensitive documents, tracks exfiltrated files via MD5 hashes, and monitors USB insertions through WMI events
In 2024, Gamaredon went to great lengths to bypass network-based blocking. It increasingly hid its C&C servers behind Cloudflare tunnels and leveraged third-party DNS services, Codeberg repositories, and Telegraph posts to evade detection.
Our detailed technical analysis of the latest Gamaredon tools and techniques is available in the white paper: web-assets.esetstatic.com/wls/
IoCs are provided in the white paper and at github.com/eset/

hackmachackmac
2025-04-22

Die jüngsten Enthüllungen zur Hackergruppe Gamaredon zeigen: es ist oft geopolitisches Kalkül. Seit Jahren wird vermutet, dass Russland Gruppen wie Gamaredon unterstützt oder gar direkt steuert.

it-daily.net/it-sicherheit/cyb

2025-04-14

#Gamaredon : The Turncoat #Spies Relentlessly #Hacking #Ukraine

For the past decade, this group of #FSB #hackers—including “traitor” #Ukrainian intelligence officers—has used a grinding barrage of #intrusion campaigns to make life hell for their former countrymen and #cybersecurity defenders.
#security #privacy

wired.com/story/gamaredon-turn

2025-04-10

Russian hackers are upping their game—switching to stealthy PowerShell tactics and malicious drives to target military networks. How safe is our digital world when threats evolve so fast?

thedefendopsdiaries.com/gamare

#gamaredon
#cyberthreats
#powershell
#cybersecurity
#infosec

2025-04-10

State-Sponsored Tactics: How Gamaredon and ShadowPad Operate and Rotate Their Infrastructure
#Gamaredon #RedFoxtrot #ShadowPad
hunt.io/blog/state-sponsored-a

2025-04-02

The russia-backed #Gamaredon group targets Ukraine once again in the ongoing campaign that employs DLL sideloading and exploits LNK files to spread #Remcos backdoor. Detect related #APT attacks with #Sigma rules from SOC Prime Platform.
socprime.com/blog/gamaredon-ca

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst