Headlines

Undercover Love and International Intrigue: RomCom Spies Take Center Stage at NATO Summit

Undercover Love and International Intrigue: RomCom Spies Take Center Stage at NATO Summitwordpress,tags,undercoverlove,internationalintrigue,romcom,spies,NATOsummit

Report: RomCom Threat Group Targets NATO Summit Attendees with New Campaign

Overview

The RomCom threat group, known for targeting pro-Ukraine organizations, has launched a new campaign aimed at attendees of a NATO Summit in Lithuania. Researchers at BlackBerry Threat Research and Intelligence discovered two malicious documents that were attributed to RomCom. One document impersonates the Ukrainian World Congress organization, while the other is a fake lobbying document in support of Ukraine. The campaign specifically targets supporters of Ukraine who are attending the NATO Summit, where Ukraine’s potential membership in NATO is being discussed. The attack spreads malicious code that exploits the .RTF file format to create a connection to the threat group’s command-and-control infrastructure.

Attack Vector and Follina Exploitation

The initial infection vector of the campaign has not been uncovered, but it is likely that RomCom lured victims through spear-phishing. The BlackBerry team uncovered a specially crafted replica of the Ukrainian World Congress website, which was used to engage victims. The malicious domain for the site utilizes typosquatting techniques, disguising itself as a legitimate website with a .info suffix. Typosquatting involves taking advantage of people’s typos and incorrect spellings of common brands, organizations, and business names in URLs.

Another component of the campaign involves exploiting a flaw in Microsoft’s Support Diagnostic Tool (MSDT) known as Follina. This flaw was a zero-day when it was discovered in May 2022 but was patched the following month. If Follina exploitation is successful, attackers can conduct a remote code execution (RCE)-based attack by crafting a malicious .DOCX or .RTF document. This technique works even when macros are disabled or a document is opened in “Protected” mode on a Windows machine.

RomCom‘s Background and Targeting

Initially identified as a group tied to the Cuba ransomware, RomCom has since moved on to have global political ambitions. The group primarily targets individuals and organizations connected to the Ukrainian government, as well as high-level supporters of Ukraine and its geopolitical affiliations. Previous campaigns by RomCom have targeted Ukrainian and pro-Ukraine targets in Eastern Europe and other parts of the world.

Recommendations

Researchers at BlackBerry recommend that potential targets defend themselves from RomCom and other advanced persistent threats (APTs) by employing security solutions equipped with behavior-monitoring capabilities. These solutions can detect malicious files, scripts, and messages and block related malicious URLs. Additionally, adding a security layer that inspects emails for malicious attachments and URLs can help individuals and organizations avoid compromise.

Given that RomCom utilizes social engineering and high-level impersonation of trusted entities, individuals should be cautious of unsolicited messages on topics related to Ukraine. It is advisable to carefully inspect related materials and URLs before clicking on any links or files.

Sources:

Spy-wordpress,tags,undercoverlove,internationalintrigue,romcom,spies,NATOsummit


Undercover Love and International Intrigue: RomCom Spies Take Center Stage at NATO Summit
<< photo by Devin Kaselnak >>
The image is for illustrative purposes only and does not depict the actual situation.

You might want to read !