Skip to main content

Ghostwriter Cyberattacks: Targeting Ukraine and Belarusian Opposition with Malicious Excel Files

N2K NetworksDecember 27, 202523 min263 views
32 connections·40 entities in this video→

Ghostwriter Threat Actor Overview

  • 🎯 Ghostwriter is a threat actor with nearly a decade of activity, significantly increasing focus on the Ukraine region since the 2022 conflict.
  • 🌍 Historically, Ghostwriter has targeted Western countries but has recently shifted to more domestic targeting within Belarus.
  • πŸ”— The group is believed to be operating within the Belarusian government, with potential collaborations with the Russian government.

Shifting Targeting Strategies

  • πŸ‡ΊπŸ‡¦ The campaign targets Ukrainian government and military entities for intelligence gathering and espionage, a typical MO for the group.
  • πŸ‡§πŸ‡Ύ A secondary focus is on the Belarusian political opposition and human rights activists, aiming to push propaganda and disrupt domestic dissent.
  • 🎭 This domestic targeting is seen as an evolution, becoming more direct in silencing opposition and blending information operations with malware delivery.

Technical Attack Vectors

  • πŸ“§ Attacks often begin with credential phishing or, more recently, strategic malware delivery via malicious documents hosted on platforms like Google Drive.
  • πŸ“„ Lures are highly specific to the target, often using Excel spreadsheets with heavily obfuscated VBA macro code.
  • πŸ“₯ The macro code writes a DLL file to the temp directory, which then loads a downloader (Picasso loader) for further payload delivery.
  • βš™οΈ The malware establishes persistence on the victim's machine, ensuring it runs upon system startup.

Sophistication and Evasion Tactics

  • πŸ’‘ While not highly sophisticated, the attacks are persistent and creative, focusing on workability and bypassing basic security measures.
  • πŸ’» Sophistication lies in the final stages, where the malware rewrites itself in memory and uses obfuscation techniques to evade antivirus and EDR tools.
  • 🎭 A fake lure document is presented to the victim after the malicious activity, masking the background processes and reducing suspicion.

Objectives and Impact

  • πŸ•΅οΈβ€β™‚οΈ For Ukrainian targets, objectives include espionage, intelligence gathering, or providing access for more disruptive actors.
  • πŸ“’ For Belarusian targets, objectives range from monitoring political opposition activities to actively disrupting or silencing them.
  • πŸ“Š Gauging success is difficult; while information operations have been notably successful in spreading narratives, direct impact on elections or military intelligence is hard to measure.

Recommendations for Defense

  • πŸ“§ Email filtering is crucial, with strict controls on links to cloud storage and downloaded files.
  • 🚫 Implementing strict controls on what can run on machines, blocking unknown executables or files from untrusted sources, is vital.
  • πŸ›‘οΈ Disabling macros helps, but attackers adapt; a multi-layered defense approach combining prevention, detection, and response is recommended.
  • πŸ”’ Individuals, especially those in high-risk regions without advanced security tools, should use features like Apple's Lockdown Mode or equivalent Android protections.
Knowledge graph40 entities Β· 32 connections

How they connect

An interactive map of every person, idea, and reference from this conversation. Hover to trace connections, click to explore.

Hover Β· drag to explore
40 entities
Chapters11 moments

Key Moments

Transcript86 segments

Full Transcript

Topics15 themes

What’s Discussed

GhostwriterCyberattacksBelarusian GovernmentUkrainian GovernmentBelarusian OppositionMalicious DocumentsExcel MacrosVBA MacrosDLL FilesPicasso LoaderPersistenceObfuscationEndpoint ProtectionInformation OperationsEspionage
Smart Objects40 Β· 32 links
CompaniesΒ· 7
MediasΒ· 3
ConceptsΒ· 14
PeopleΒ· 6
ProductsΒ· 6
LocationsΒ· 4