Rare Werewolf Cyber Attacks: the Threat to Russia and CIS Countries

Listen to this Post

Featured Image
Cybersecurity threats have evolved dramatically in recent years, with attackers continuously refining their techniques to bypass traditional defenses. One such sophisticated threat actor, known as Rare Werewolf (previously Rare Wolf), has been targeting Russia and the Commonwealth of Independent States (CIS) countries, leveraging innovative tactics and third-party software for malicious activities. This article delves into the nature of Rare Werewolf’s cyber campaign, its modus operandi, and its impact on various sectors.

Overview of Rare

Rare Werewolf, also known as Librarian Ghouls and Rezet, is an advanced persistent threat (APT) group that has been operational since at least 2019. This group has made its mark by conducting a series of cyberattacks, primarily targeting organizations in Russia, Belarus, and Kazakhstan. The cybercriminals behind Rare Werewolf are known for their use of legitimate third-party software to conduct malicious activities, making their attacks harder to detect.

Kaspersky reports that the group’s primary objective is to establish remote access to compromised systems, steal credentials, and deploy XMRig cryptocurrency miners. The tactics employed by the group include phishing emails, which contain password-protected archives with executable files that deploy malware when opened. This malware functions as a tool to monitor infected systems, steal sensitive data, and even disable antivirus programs to avoid detection.

In the most recent attack, the group has used software like 4t Tray Minimizer to obscure their presence on the infected systems, making it harder for cybersecurity experts to identify the attackers. Additionally, the threat actors rely on tools like PowerShell scripts and batch files to facilitate their operations. A notable feature of the attack is the use of AnyDesk remote desktop software, allowing the attackers to maintain a foothold on the system for an extended period.

What Undercode Say:

Rare Werewolf’s approach to cyberattacks is highly strategic and well-organized, leveraging the power of legitimate tools to bypass traditional defenses. The group’s ability to exploit third-party software is a defining characteristic of its operations. By using tools that are already trusted by the operating system, the attackers significantly reduce the chances of detection. This method highlights a growing trend in cybercriminal activities where APT groups turn to legitimate software and open-source tools to further their malicious agendas.

The attack pattern typically begins with phishing emails that include a password-protected archive. These emails contain a decoy document that appears legitimate, such as a PDF mimicking a payment order, which encourages the victim to open the file. Once opened, the archive installs the 4t Tray Minimizer along with other payloads like Defender Control and Blat, enabling the attackers to disable security measures and send stolen data to an attacker-controlled email.

The use of AnyDesk remote desktop software further enhances the attackers’ ability to maintain control over the infected machines. It is a common method among APT groups to exploit legitimate remote access tools, as they allow for persistent access without triggering security alerts. Additionally, the attackers schedule tasks on the victim’s system, such as waking the system up at specific times to facilitate remote access.

The deployment of XMRig cryptocurrency miners is another key aspect of Rare Werewolf’s attacks. By leveraging the processing power of infected machines, the group is able to mine cryptocurrency without the victim’s knowledge, which can yield significant financial returns.

The Rare Werewolf group is part of a growing trend of cybercriminals who focus on blending in with the wider cybercrime community. In doing so, they avoid standing out and can operate with more anonymity, making attribution more challenging.

Fact Checker Results ✅

Rare Werewolf has been active since at least 2019, primarily targeting Russia, Belarus, and Kazakhstan. ✅
The group uses legitimate third-party software like 4t Tray Minimizer and AnyDesk to carry out its attacks. ✅
XMRig cryptocurrency miners are used to hijack infected systems for financial gain. ✅

Prediction 🔮

Given the sophistication of Rare

References:

Reported By: thehackernews.com
Extra Source Hub:
https://www.facebook.com
Wikipedia
Undercode AI

Image Source:

Unsplash
Undercode AI DI v2

Join Our Cyber World:

💬 Whatsapp | 💬 Telegram