Kazakhstan's Diplomatic Documents Reportedly Targeted in Cyber Campaign
Photo: Elements.envato.com, ill. purposes
A cyber espionage campaign, allegedly connected to the Kremlin, has reportedly targeted Central Asian countries, including Kazakhstan, according to digital security firm Sekoia.
Infosecurity Magazine reports:
According to recent findings by cybersecurity firm Sekoia, the campaign involved weaponized Microsoft Word documents designed to deliver HatVibe and CherrySpy malware, collecting strategic intelligence on Kazakhstan’s diplomatic and economic relations.
The investigation began in October when Sekoia discovered a document in the VirusTotal database.
The attackers used a macro to activate malware on recipients' devices, first deploying the HatVibe backdoor, followed by the more sophisticated CherrySpy malware – a technique previously used against Ukrainian scientific institutions.
The compromised documents included diplomatic correspondence and administrative files from Kazakhstan's Foreign Ministry dating from 2021 to 2024.
The attack bears hallmarks of APT28, a group allegedly connected to Russia's GRU and funded by the Kremlin.
APT28 has a history of targeting diplomatic, defense and scientific sectors across Europe and Asia, often using spear phishing with malicious macros and scheduled task persistence, notes Infosecurity Magazine.
According to Sekoia's analysis:
The most recent documents are two diplomatic letters, one from the Embassy of Kazakhstan in Afghanistan, the second from the Embassy of Kazakhstan in Belgium, both intended for the central Ministry of Foreign Affairs regarding diplomatic cooperation and economic issues. The both are dated early September 2024.
The documents supposedly included materials related to President Toqayev's state visit to Mongolia and his meeting with American companies in New York.
The hackers also accessed a Kyrgyz Defense Ministry letter discussing military cooperation in Central Asia, which contained information about a "special operation by the PRC against Taiwan."
The UAC-0063 utility used in this campaign has previously targeted Ukraine, Israel, India, Kyrgyzstan, and Tajikistan.
Another major data breach in early 2024 included personal information about Kazakhstani security officials, though Kazakhstan's authorities never officially confirmed this. Chinese hackers had been stealing data from Kazakhstani information networks for two years.
Orda.kz has sent official inquiries to Kazakhstan's Foreign Ministry, the Ministry of Digital Development, Innovation and Aerospace Industry, and the Center for Analysis and Investigation of Cyberattacks.
Original Author: Nikita Drobny
Latest news
- Pilots Posthumously Found Guilty in 2019 Bek Air Crash Case
- Partial Roof Collapse Reported at Kazakhmys Mine in Ulytau Region
- Kazakhstanis Send Record Transfers to Russia
- European Bank Shows Interest in Acquiring Kazakhstani Bank
- Majilis Member Questions Banking Sector Privileges and Oversight, Criticizes Former Prime Minister Mamin
- U.S. to Review Gunvor’s Lukoil Deal Over Possible Putin Links
- EU Commission: Georgia’s EU Candidacy Now “Nominal”
- MP Discusses Legal Recognition for Second Wives in Interview
- Debate Emerges in Majilis Over Creation of State “Agrobank”
- Kazakhstan: MP Raises Alarm Over Surge in Phone Fraud
- Kazakhstan Considers Creating a State Crypto Reserve
- U.S. Proposes Lifting U.N. Sanctions on Syria’s President Ahead of White House Visit — Reuters
- Second Reading: Majilis Approves Amendments to Subsoil Code
- Kazakhstan: Plans Announced to Establish Unified Financial Ombudsman Service
- Majilis Reviews Draft Law Introducing Two Types of Banking Licenses
- Rumors Resurface About Government Reshuffle as Criticism Mounts
- Putin Signs Laws on Year-Round Conscription
- Kazakh-Born Woman Wanted by Interpol, Accused of Child Abduction
- Man Distributes Extremist Videos from Prison, Sentenced to Nine Years
- Seventeen-Year-Old Killed in Shooting in Turkistan Region