Cyber Threat Report: 'Ongoing ITG05 operations leverage evolving malware arsenal in global campaigns'

Report Author IBM X-Force
Publication Date 2024-03-11
Original Reporting Source
Attributed to Nation Russia
Related Intrusion Sets Forest Blizzard , Fancy Bear , APT28 , ITG05
Identified CVEs CVE-2023-23397
Victim Sectors Financial Services, Technology, National Government, Defense

This Security Intelligence blog post by researchers at IBM's X-Force describes activity by ITG05 - a group which shows overlap with APT28/Forest Blizzard/Fancy Bear, and who's activities align with Russian state objectives. As of March 2024, X-Force analysts have observed ITG05 actively conducting phishing campaigns across Europe, Asia, and the Americas. These campaigns involve impersonating various organizations to distribute malware. The group's tactics continue to evolve, and they have introduced new backdoors like MASEPIE and OCEANMAP, along with a simplified PowerShell script named STEELHOOK. ITG05. The post also includes recommended mitigations including monitoring for specific URLs, blocking NTLMv2 authentication, and keeping informed about new vulnerabilities and exploits.

Cyber Threat Graph Context

Explore how this report relates to the wider threat graph