An attack campaign that targeted Croatian government agencies earlier this year was found to use new malware for operations. The attack campaign was reportedly active between February and April. For executing it, attackers relied on spear-phishing that impersonated Croatian Post and other services in order to prey on government employees.
According to threat researcher Alexey Vishnyakov of Positive Technologies, the threat actors deployed malware using post-exploitation tools such as SilentTrinity and Empire.
Key highlights
Impersonation tactics
In a blog post, Vishnyakov details how they discovered the two-month spanned campaign. One of the factors pointed out was that the attackers impersonated even the domain names of the government sites.
“The domain names were chosen to resemble those of legitimate sites. Such names would presumably arouse less suspicion among phishing targets. Not all the impersonated domains related to Croatia. All attacker domains were registered with WhoisGuard privacy protection. Ordinarily used to protect domain owners from spam by hiding personal information, this feature helped the attackers to remain anonymous,” wrote Vishnyakov in his blog.
After the campaign’s discovery, the Croatian Information Systems Bureau warned government employees of phishing attacks. As of now, the attackers are still unknown.
Publisher