Hackers use new malware to breach air-gapped devices in Eastern Europe

Teilen:

Chinese state-sponsored hackers have been targeting industrial organizations with new malware that can steal data from air-gapped systems.

Air-gapped systems typically fulfill critical roles and are isolated from the enterprise network and the public internet either physically or through software and network devices.

Researchers at cybersecurity company Kaspersky discovered the new malware and attributed it to the cyber-espionage group APT31, a.k.a. Zirconium.

According to the findings, the hackers used at least 15 distinct implants in attacks in Eastern Europe, each for a distinct stage of the operation, as well as their signature ‘FourteenHi’ malware family.

Multi-stage attacks

Kaspesky says that the attacks started in April last year and involved three separate stages. The implants in the initial-phase established persistence and remote access to the compromised systems and collected data useful for reconnaissance.

In the second stage, APT31 drops more specialized malware that can steal data from isolated (air-gapped) systems using USB propagation.

Finally, in the third stage of the attack, the hackers use implants that can upload the collected data to their command and control (C2) servers.

The malware that targets isolated systems consists of four modules described below.

  1. First module: Profiles removable drives connected to the system, collects files, captures screenshots and window titles, and drops additional payloads on the infected device.
  2. Second module: Infects removable drives by copying a legitimate McAfee executable which is vulnerable to DLL hijacking, and a malicious DLL payload onto the root directory of the device, and sets them as “hidden.” The tool also creates a lure LNK file that triggers the infection if the victim launches it.
  3. Third module: Executes a batch script to collect data from the device and save the output to the “$RECYCLE.BIN” folder, from where the first module will collect it.
  4. Fourth module: Variant of the first module seen in some attacks, acts as a payload dropper, keylogger, screenshot-capturing tool, and file stealer.
Infection route
Infection route for air-gapped systems (Kaspersky)

In May 2022, Kaspersky noticed an additional implant used in the APT31 attacks, designed to collect local files from breached systems.

That implant decrypts and injects its payload into the memory of a legitimate process to evade malware detection, then sleeps for 10 minutes and eventually copies all files that match the file type extensions defined in its configuration.

The stolen files are archived using WinRAR (if not available, the malware exits) and then stored in temporary local folders created by the malware under “C:ProgramDataNetWorks.” Ultimately, the archives are exfiltrated to Dropbox.

Kaspersky underlines that the attacks were stealthy and listed the following tactics, techniques, and procedures (TTPs): DLL order hijacking to load malicious payloads into memory and hide payloads in encrypted form in separate binary data files.

The company provides a technical report that includes additional data such as malware hashes, a full set of indicators of compromise, and details about the activity of the malware from start to finish.

Air-gapped systems are an attractive target for APT groups, who typically turn to USB drives to deliver malware and exfiltrate data from the isolated environment.

 

(c) Lawrence Abrams

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
8:37 am, Mai 24, 2025
Wetter-Symbol 14°C
L: 14° | H: 15°
overcast clouds
Luftfeuchtigkeit: 90 %
Druck: 1012 mb
Wind: 9 mph SW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 100%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:56 am
Sonnenuntergang: 8:58 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
14° | 15°°C 0.24 mm 24% 14 mph 90 % 1012 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
13° | 19°°C 1 mm 100% 16 mph 92 % 1015 mb 0 mm/h
Mo. Mai 26 10:00 pm
Wetter-Symbol
10° | 16°°C 0.78 mm 78% 15 mph 78 % 1017 mb 0 mm/h
Di. Mai 27 10:00 pm
Wetter-Symbol
13° | 17°°C 1 mm 100% 15 mph 95 % 1016 mb 0 mm/h
Mi. Mai 28 10:00 pm
Wetter-Symbol
14° | 21°°C 1 mm 100% 16 mph 96 % 1019 mb 0 mm/h
Today 10:00 am
Wetter-Symbol
14° | 16°°C 0.24 mm 24% 11 mph 90 % 1012 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
16° | 20°°C 0.06 mm 6% 13 mph 82 % 1012 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
21° | 24°°C 0 mm 0% 14 mph 68 % 1011 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
20° | 20°°C 0 mm 0% 11 mph 67 % 1010 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
18° | 18°°C 0 mm 0% 11 mph 84 % 1010 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
15° | 15°°C 0.2 mm 20% 11 mph 88 % 1008 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
14° | 14°°C 1 mm 100% 16 mph 92 % 1007 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
13° | 13°°C 0.8 mm 80% 14 mph 84 % 1008 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€95,131.85
-2.30%
Ethereum(ETH)
€2,249.22
-4.12%
Fesseln(USDT)
€0.88
0.03%
XRP(XRP)
€2.06
-3.57%
Solana(SOL)
€154.00
-3.92%
USDC(USDC)
€0.88
0.00%
Dogecoin(DOGE)
€0.201007
-6.88%
Shiba Inu(SHIB)
€0.000012
-6.61%
Pepe(PEPE)
€0.000012
-9.91%
Peanut das Eichhörnchen(PNUT)
€0.309779
-5.58%
Nach oben scrollen