Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier

Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier

Last week, Ukraine’s Main Intelligence Directorate (GUR) orchestrated a sophisticated cyberattack against Gaskar Integration, a leading Russian drone manufacturer.

The operation began with reconnaissance of the company’s public-facing infrastructure, where threat actors identified vulnerable remote desktop services and outdated VPN gateways.

Leveraging a zero-day in a third-party web application firewall, the attackers gained initial foothold within the corporate network. Once inside, they deployed custom malware that exploited Windows Management Instrumentation (WMI) to execute lateral movement and harvest credentials.

Google News

Hromadske analysts noted that the malicious payload incorporated a dual-stage loader written in C++ and PowerShell.

The first stage established persistence via a malicious WMI subscription, while the second stage decrypted a reverse-shell implant in memory.

Communications were tunneled over TLS using forged certificates that mimicked the company’s own public key infrastructure.

The malware’s command-and-control (C2) infrastructure was hosted on compromised industrial control system servers, further complicating attribution and takedown efforts.

By the time defenders detected anomalous network traffic, the attackers had exfiltrated more than 47 TB of technical data, including drone design schematics, production logs, and employee records.

All backup copies on the victim’s servers were irreversibly deleted, effectively crippling Gaskar’s manufacturing and accounting operations.

Workers were locked out of production software and physical access systems, with only fire exits remaining functional.

Hromadske researchers identified key modules of the implant by reverse-engineering its unpacker.

Infection Mechanism

The malware’s infection mechanism hinged on the exploitation of a WAF bypass. After gaining access, the attackers uploaded a tiny dropper—less than 15 KB—that executed a Base64-encoded PowerShell one-liner.

This script reached out to a hard-coded C2 domain, downloaded an encrypted payload, and invoked it entirely in memory to evade disk-based detection.

The persistent WMI event filter was crafted as follows:-

$filter = Set-WmiInstance -Namespace rootsubscription -Class __EventFilter `
  -Arguments @{
    Name = "SysUpdateFilter"
    EventNameSpace = "rootcimv2"
    QueryLanguage = "WQL"
    Query = "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA 'Win32_LocalTime'"
  }
Set-WmiInstance -Namespace rootsubscription -Class __FilterToConsumerBinding `
  -Arguments @{
    Filter = $filter
    Consumer = $consumer
  }

This ensures execution on every system clock tick, granting the implant high survivability even after reboot.

Boost detection, reduce alert fatigue, accelerate response; all with an interactive sandbox built for security teams -> Try ANY.RUN Now


Source link