Cyber Threat Report: 'KAPEKA A novel backdoor spotted in Eastern Europe'
This report from researchers at WithSecure unveils a novel backdoor: 'Kapeka'. Kapeka has been used against victims in Eastern Europe (particularly Ukraine) since mid-2022. It's an early-stage toolkit for operators, providing long-term access to victims' systems. Kapeka is linked by the researchers to the Sandworm group, operated by Russia's GRU, known for destructive attacks in Ukraine. Kapeka was discovered after analyzing artifacts from a Russian APT-linked intrusion set. It's a bespoke tool used in targeted attacks, with no previous variants reported. However analysis by the researchers identified overlap with the 'GreyEnergy' tool, which itself was considered an evolution of the BlackEnergy toolkit used in historic attacks by sandworm. The dropper is a 32-bit executable that sets up the backdoor's persistence and self-deletes. It chooses the appropriate backdoor version based on the victim's processor architecture and uses AES-256 encryption. The backdoor is a DLL masquerading as a Microsoft Word Add-In. It collects information on the victim's machine and user, communicates with C2 servers, and can execute various tasks like reading and writing files, launching processes, and self-upgrading or uninstalling. The report includes technical analysis of the dropper and back door as well as discussing the attribution to Sandworm. MITRE ATT&CK mappings and indicators of compromise (IoCs) are also included as appendices.
Cyber Threat Graph Context
Explore how this report relates to the wider threat graph