Hacked, but not broken: how a Russian bank struggled with RedCurl hacker attacks

Carding

Professional
Messages
2,831
Reputation
17
Reaction score
2,025
Points
113
Hackers do not give up and look for any ways to steal confidential data.

The Russian information security company F. A. C. C. T. has registered new attacks by the hacker group RedCurl, known for its activities in the field of commercial espionage and theft of corporate information.

The detected attacks were directed at one of the main banks in Russia, which was subjected to cyber attacks twice: the first time-using specialized phishing emails on behalf of a large Russian marketplace, and the second time — through a bank contractor.

A recent F. A. C. C. T. report details the RedCurl attacks that occurred in November 2022 and May 2023. In both cases, the primary implementation strategy for the corporate network was the use of phishing emails with malware. The letters were written on behalf of the marketplace and promised family members and employees a 25% corporate discount on all products.

pautcxq8hsa7v9ahygvu51cw83vpa7da.png

Example of a RedCurl phishing email

The target of the November hack was a well-known Russian bank from the list of systemically important credit institutions. Despite the cybercriminals ' attempt to send malicious messages, their emails were detected, blocked and did not reach the recipients due to the email protection system installed in the banking infrastructure.

After the first failed attempt, RedCurl hackers targeted the bank's contractor, using the tactic of attacking the supplier (Supply Chain). Having established control over the contractor's employee's computer, presumably through a phishing newsletter, the attackers gained access to a shared network drive with client documents, which allowed them to penetrate the infrastructure of the financial institution.

During the investigation of incidents in November 2022 and May 2023, F. A. C. C. T. specialists collected and analyzed samples of the RedCurl malware.

At the first stage of infection, the group used the loader "RedCurl.SimpleDownloader", specially designed for a new campaign using the marketplace brand. F. A. C. C. T. experts believe that this is a new full-fledged tool that will be modified and used in future RedCurl attacks.

In the next step, the updated loader "RedCurl.Downloader" was used to download "RedCurl.Extractor". This program is used to install the "RedCurl.FSABIN" agent, which, in turn, provides attackers with remote access to the infected computer.

The F. A. C. C. T. representative stressed that groups such as RedCurl pose a threat to Russian companies that do not have solutions for early prevention of complex attacks. Despite the fact that the email protection tool stopped the attack, cybercriminals found a weak link in the form of a supplier — this attack vector must also be taken into account.

In their report, F. A. C. C. T. specialists described the infection chains of the RedCurl group, compromise indicators (IoC), and protection recommendations in accordance with the MITRE ATT&CK matrix.
 

planet_gicker

Carder
Messages
38
Reputation
0
Reaction score
16
Points
8
I read about that, and what's unusual about this is that about half of the attacks have been aimed at victims in Russia, while the other half targeted organizations in Ukraine, Canada, and Europe.

Whats even weirder is that this group does not encrypt the data of its victims and does not demand a ransom. It hunts for documents with commercial secrets and personal data of employees, and tries to get them as discreetly as possible.

It seems to have all the hallmarks of such attack being backed by state sponsored actors,

RedCurl remains one of the most interesting Russian-language cybercrime groups, especially given the uncommon targeting Russian citizens which is very unusual. Anyway, we will see what happens next ....
 
Top