Check us out on Instagram

Cyber Society

Russian GRU Military HACKS Ukraine

Russian GRU Military HACKS Ukraine

Russian GRU Military HACKS Ukraine
byDarsh Poddaron Sep 20, 2023
staysafe
GRUHackers

In a concerning turn of events, the Russian General Staff of the Armed Forces, known as GRU, has recently introduced a formidable threat to the digital landscape of Ukraine. Dubbed 'Infamous Chisel,' this malicious framework is designed to infiltrate Android devices, and it poses a substantial security risk that warrants our immediate attention. In this blog post, we'll delve into the details of this new cyber threat and its potential implications.

Infamous Chisel: A Stealthy Intruder

Infamous Chisel is no ordinary malware; it's a highly sophisticated toolkit that provides hackers with backdoor access through the Tor anonymity network. Once it infiltrates a device, it can perform a wide range of malicious activities, including scanning files, intercepting network traffic, and exfiltrating sensitive data. This multifaceted approach makes it a formidable adversary in the digital realm.

Ukraine's Alert: Sandworm's Intrusion Attempts

The Ukrainian Security Service (SSU) has sounded the alarm regarding the activities of the notorious Sandworm hacking group. This group has been actively attempting to breach Ukraine's military command systems using the Infamous Chisel malware. This warning underscores the seriousness of the threat and emphasizes the importance of taking immediate cybersecurity measures.

Peering Inside Infamous Chisel

The National Cyber Security Centre (NCSC) describes Infamous Chisel as a collection of components that facilitate persistent access to infected Android devices via the Tor network. It operates by periodically collecting and exfiltrating victim information, which is a grave concern for both individuals and organizations.

Infection and Targets: A Stealthy Approach

Infamous Chisel gains entry to devices by replacing the legitimate netd Android system binary, making it challenging to detect. Once inside, it specifically targets Android devices, scanning for Ukrainian military-related data and applications, and then surreptitiously sends this data to attacker-controlled servers.

Data Gathering: Tracking Every Move

This malware employs several tactics to gather sensitive data. It tracks files sent to hackers using MD5 hashes and scans directories, including internal memory and SD cards. Moreover, it doesn't discriminate when it comes to file types, targeting popular apps such as WhatsApp, Signal, Gmail, and more.

Remote Access: A Gateway for Intruders

Infamous Chisel provides attackers with a range of capabilities, including gathering hardware information, probing local networks, and establishing remote access through SOCKS and SSH connections via a .ONION domain. These features grant hackers extensive control over compromised devices.

Data Exfiltration: Stealing in Plain Sight

Data exfiltration is a key concern with Infamous Chisel, as it occurs at regular intervals. Every 86,000 seconds (approximately one day), data is stealthily siphoned away. LAN scanning is performed every two days, and the most critical military data is exfiltrated every 600 seconds (ten minutes). This level of precision highlights the malware's advanced capabilities.

Configurations: Behind the Scenes

To maintain its stealthy presence, Infamous Chisel reconfigures Tor services for remote access every 6,000 seconds, and it routinely checks network connectivity every 3 minutes. These frequent adjustments make it a persistent and elusive threat.

Final Thoughts: Cybersecurity is a Collective Responsibility

In an age where digital threats are becoming increasingly sophisticated, it's imperative to recognize that cybersecurity is a responsibility shared by all. Whether you're a technical expert or a non-technical user, staying vigilant and informed is crucial for protecting yourself and your digital assets. We'll continue to provide updates and insights on how to stay safe in the ever-evolving digital landscape. Stay tuned for more information on safeguarding your online presence.