InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: APT29 will deploy grey prober malware targeting European diplomats through wine tasting lures
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > APT29 will deploy grey prober malware targeting European diplomats through wine tasting lures
Technology

APT29 will deploy grey prober malware targeting European diplomats through wine tasting lures

April 20, 2025 6 Min Read
Share
GRAPELOADER Malware Targeting European Diplomats
SHARE

The Russian state-sponsored threat actor known as APT29 is linked to an advanced phishing campaign targeting European diplomatic entities with new variants of Wineloader and Graperoder, a previously unreported malware loader codename.

“While the improved Wineloader variant is still a modular backdoor used at later stages, Grapeloader is a newly observed early stage tool used for fingerprinting, persistence and payload delivery.”

“Despite their different roles, both share similarities between chord structure, obfuscation and string decoding. Grey Peroder improves Wineloader’s anti-analytic technology while introducing more advanced stealth methods.”

The use of Wineloader was first documented in February 2024 by Zscaler Threatlabz, and the attacks harnessed wine-style lures to infect the diplomatic staff system.

The campaign was initially attributed to a threat activity cluster named SpikedWine, but subsequent analysis by Google-owned Mandiant connected to an APT29 (aka Cozy Bear or Midnight Blizzard) hacking group belonging to the Russian Foreign Intelligence Reporting Agency (SVR).

The latest set of attacks will send an email invitation impersonating an unspecified European Foreign Office to win wine, and then click on a link that uses the malware layer ZIP archive (“Wine.zip”) to trigger the deployment of the grey prober. Emails were sent from the domains from Bakenhof(.)com and silky(.)com.

The campaign is said to have selected several European countries with a special focus on the ministries of the Ministry of Foreign Affairs, as well as embassies of other European countries. There are indications that Middle East-based diplomats may also be targeted.

The ZIP archive contains three files: a dll (“appvisvsubsystems64.dll”) that acts as a dependency for running a legitimate PowerPoint executable (“Wine.exe”). Sideloaded malware acts as a loader (i.e., Grapeloader) to drop the main payload.

See also  Researchers reveal flaws in new Intel CPUs that allow memory leaks and Specter V2 attacks

Malware gains persistence by modifying the Windows registry to ensure that the “Wine.exe” executable is launched every time the system is rebooted.

Grey Proder Malware Targeting European Diplomats

In addition to incorporating anti-analytic techniques such as string obfuscation and runtime API Resolving, Grapeloader is designed to collect basic information about infected hosts and extend it to external servers to obtain the next stage shellcode.

The exact nature of the payload is unknown, but Check Point said it has identified updated Wineloader artifacts uploaded to the Virustotal platform using a compilation timestamp that matches “AppVisvSubsyStems64.dll”.

“We believe this information and the fact that Grapeloader has replaced Rootsaw, the HTA downloader used in past campaigns to provide Wineloader, will ultimately lead to the deployment of Wineloader,” the cybersecurity company said.

The findings provide a detailed explanation of Harfanglab’s detailed Gameardon Pterolnk VBScript malware. This infects malicious programs in VBScript or PowerShell versions of the Russian threat actors use to all connected USB drives. The Pterolnk sample was uploaded to Virustotal from Ukraine, the main target of the hacking group between December 2024 and February 2025.

“Both tools repeatedly try to detect attached USB drives to drop LNK files when deployed to the system, and sometimes even copies of Pterolnk are attempted to detect them,” ESET said in September 2024. payload. ”

The French cybersecurity company explained that it is responsible for dynamically building the downloader and LNK dropper while running the Pterolnk VBScript file. The downloader is scheduled to run every 3 minutes, while the LNK dropper script is configured to run every 9 minutes.

See also  The attacker warning Fortinet holds a Patchative Patching Patchate via SSL-VPN Symlink Exploit

The downloader adopts a modular multi-stage structure to reach out to the remote server and get additional malware. Meanwhile, LNK droppers propagate locally and network drives and hide the original files with counterparts of shortcuts that deceive existing .pdf, .docx, and .xlsx files in the root of the directory. These shortcuts are designed to run pterolnk instead upon startup.

“The scripts are designed to allow operator flexibility and allow easy changes to file names and paths, persistence mechanisms (registry keys and scheduled tasks), and detection logic for the target system’s security solution,” says Harfanglab.

It is worth noting that the downloader and LNK droppers are referring to the same two payloads that the Symantec Threat Hunter team, part of Broadcom, revealed earlier this month as part of the attack chain that distributes updated versions of Gammasteel Stealer.

  • ntuser.dat.tmcontainer00000000001.regtrans-ms (downloader)
  • nttuser.dat.tmcontainer00000000002.REGTRANS-MS (LNK Dropper)

“Gummerderson operates as a key component of Russia’s cyber operations strategy, particularly in the ongoing war with Ukraine,” the company said. “Gummerson’s effectiveness lies in its tactical adaptability, not its technical refinement.”

“These modalities combine aggressive spear campaigns, rapid deployment of massively obfuscated custom malware, and redundant C2 infrastructure. The group prioritizes operational impacts on stealth exemplified towards long domains that expose DDRs to past operations.”

Share This Article
Twitter Copy Link
Previous Article Despite Valheim's comparison, Jagex defends the price of Runescape DragonWilds Despite Valheim’s comparison, Jagex defends the price of Runescape DragonWilds
Next Article mm MIT-backed basic EGI debuts general engineering information to transform manufacturing

Latest News

mm

Evogene and Google Cloud unveils basic models for the design of generative molecules, pioneering a new era of life science.

Evogene Ltd. has announced beginners in the class Generated AI…

June 11, 2025
Interpol dismantles over 20,000 malicious IPS linked to 69 running malware variants.

Interpol dismantles over 20,000 malicious IPS linked to 69 running malware variants.

Wednesday Interpol announced the dismantling of over 20,000 malicious IP…

June 11, 2025
mm

“Secure” images are not difficult to steal with AI.

New research suggests that watermarking tools aimed at blocking AI…

June 10, 2025
Non-Human Identity Management

Why is non-human identity management the next cybersecurity frontier?

Modern enterprise networks are extremely complex environments that rely on…

June 10, 2025
Why Meta's biggest AI bets aren't in the model - it's in the data

Why Meta’s biggest AI bets aren’t in the model – it’s in the data

Meta's reported $10 billion investment in scale AI represents more…

June 9, 2025

You Might Also Like

Understand Helpdesk fraud and how to protect your organization
Technology

Understand Helpdesk fraud and how to protect your organization

13 Min Read
Zero-Day in Azure Breach
Technology

Commvault confirms that hackers misuse CVE-2025-3928 as zero day in an Azure violation

2 Min Read
mm
Technology

Within Openai’s O3 and O4 ‑ Mini: Unlock new possibilities through multimodal inference and integrated toolset

9 Min Read
mm
Technology

How AI is redrawing the world’s electrical maps: insights from IEA reports

8 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?