Russian Hackers Exploit Rival Attackers' Infrastructure for Espionage

Summary:
Secret Blizzard, a Russian state-sponsored advanced persistent threat group attributed to Center 16 of the FSB, has developed a unique strategy of leveraging tools and infrastructure from other threat actors to enhance its espionage operations. Over the past seven years, Secret Blizzard has used the tools and infrastructure of at least six different threat groups, including both state-sponsored and cybercriminal entities. This approach allows them to piggyback on existing footholds and infrastructure, reducing their effort while maintaining operational stealth. These tactics are exclusively employed for espionage purposes, such as gathering exfiltrated data staged by other threat actors or deploying their own backdoors to compromised devices.

In a collaborative effort, Microsoft Threat Intelligence and Black Lotus Labs uncovered Secret Blizzard's exploitation of the infrastructure of Storm-0156, a Pakistan-based espionage group also known as SideCopy, Transparent Tribe, and APT36. Since November 2022, Secret Blizzard has used Storm-0156’s C2 servers to deploy its own backdoors, including TinyTurla, TwoDash, and MiniPocket. They also commandeered Storm-0156’s tools, such as CrimsonRAT and Wainscot, to further their objectives. Additionally, Secret Blizzard leveraged advanced techniques like DLL side-loading and search-order hijacking to execute malicious payloads and evade detection.


Analyst Comments:
Notably, the group’s activities have targeted South Asian entities, including government and military institutions in Afghanistan and India. In Afghanistan, Secret Blizzard deployed backdoors to devices within government organizations, such as the Ministry of Foreign Affairs and the General Directorate of Intelligence. In India, they primarily focused on Storm-0156’s infrastructure, exfiltrating data from military and defense-related institutions rather than directly targeting devices. This difference in approach may reflect political considerations or operational directives within the FSB.


Suggested Corrections:
To harden networks against the Secret Blizzard activity listed above, defenders can implement the following:


Strengthen Microsoft Defender for Endpoint configuration

Strengthen Microsoft Defender Antivirus configuration

Strengthen operating environment configuration

Link(s):
https://www.infosecurity-magazine.com/news/russia-hackers-exploit-rival/

https://www.microsoft.com/en-us/sec...sing-storm-0156-infrastructure-for-espionage/