Security Program Controls/Technologies

New Sandworm Attacks Use Trojanized MSFT Activators

Red glowing word cyberattack on a black wall surrounded by green random letters cybersecurity concept 3D illustration

Russian state-sponsored threat group Sandworm deployed attacks involving malicious Microsoft Key Management Service activators and bogus Windows updates against Ukrainian Windows users since late 2023, BleepingComputer reports.

Sandworm, also known as APT44, Seashell Blizzard, and UAC-0113, launched numerous malware intrusions as part of the campaign.

The most recent attack involved the distribution of a fake KMS activation tool containing the BACKORDER malware loader that facilitated DarkCrystal RAT delivery following Windows Defender deactivation, according to an EclecticIQ analysis.

DcRAT enabled the exfiltration of targeted devices' saved credentials, browser cookies and histories, keystrokes, FTP credentials, and system details.

"Many users, including businesses and critical entities, have turned to pirated software from untrusted sources, giving adversaries like Sandworm (APT44) a prime opportunity to embed malware in widely used programs. This tactic enables large-scale espionage, data theft, and network compromise, directly threatening Ukraine's national security, critical infrastructure, and private sector resilience," said EclecticIQ.

You can skip this ad in 5 seconds