Gamaredon Exploits Troop Movement Lures to Spread Remcos via DLL Sideloading

Gamaredon Exploits Troop Movement Lures to Spread Remcos via DLL Sideloading
Summary: A targeted malware campaign by the Russian state-aligned group Gamaredon is exploiting Windows shortcut files to disseminate the Remcos backdoor, primarily targeting users in Ukraine. By masquerading as sensitive military documents, this operation takes advantage of the ongoing geopolitical strife, using sophisticated techniques for stealth and access retention. The campaign showcases the group’s evolving tactics, including DLL sideloading and geo-fenced server access to execute attacks.

Affected: Organizations and individuals in Ukraine

Keypoints :

  • Gamaredon utilizes .LNK files disguised as military documents to deploy malware.
  • The malware delivery is geo-fenced, restricting payload access to users identified as being in Ukraine.
  • DLL sideloading is employed to execute the Remcos backdoor, allowing full control over infected systems.
  • The use of common application names helps in avoiding detection during execution.
  • The operation reflects Gamaredon’s adaptive tradecraft in malware distribution, focusing on high-value targets amidst ongoing conflict.

Source: https://securityonline.info/gamaredon-exploits-troop-movement-lures-to-spread-remcos-via-dll-sideloading/