Russian hackers hit military mission in Ukraine with info-stealing malware on external drives

Cyberattack
(Image credit: Cyberattack)

  • Symantec says it found GammaSteel on devices belonging to a military operation in Ukraine
  • GammaSteel is an infostealer built by Russian cyber-outfit Gamaredon
  • Gamaredon is one of many groups on GRU's payroll

A “military mission of a Western country”, located in Ukraine, was the target of a Russian cyber-espionage attack according to cybersecurity researchers Symantec, who said they identified an attack that started in February 2025 and likely continued for several weeks.

The researchers claim the attack started with an infected removable drive containing a malicious .LNK file that triggered an infection chain which resulted in the deployment of GammaSteel.

GammaSteel is an infostealer malware, capable of exfiltrating documents in various formats, such as .DOCX, .PDF, .XLS, .TXT, and more. It was most likely built and deployed by a Russian state-sponsored threat actor known as Gamaredon (or Shuckworm).

Monitor your credit score with TransUnion starting at $29.95/month

Monitor your credit score with TransUnion starting at $29.95/month

TransUnion is a credit monitoring service that helps you stay on top of your financial health. With real-time alerts, credit score tracking, and identity theft protection, it ensures you never miss important changes. You'll benefit from a customizable online interface with clear insights into your credit profile. Businesses also benefit from TransUnion’s advanced risk assessment tools.

Preferred partner (What does this mean?)

Infected removable drives

Besides stealing files, it can also take screenshots of the infected device, and gather vital information about things like installed antivirus tools, running processes, and more.

Finally, the tool establishes persistence on the compromised endpoints via a new Windows registry entry. The researchers said that the threat actors changed their tactics a bit to better hide the payload.

Symantec did not say whose military mission was compromised, or what kind of information - if any - was stolen in the attack. It is safe to assume that the attack is part of a broader cyber-war effort since Russia invaded Ukraine more than three years ago.

Russian aggression has shown just how much warfare changed and turned digital. The digital world became an entire front, with Russian cyber-infantry targeting communications satellites, government endpoints, electrical substations, and more.

The Ukrainians responded by hacking Russian TV and radio to broadcast anti-war messages, manipulated a taxi app to send dozens of cars to a single location in Moscow, and leaked gigabytes of data from Russian entities, including the private military Wagner Group.

Gamaredon is just one of many groups actively involved in the war, next to Conti, or Sandworm. All are apparently part of GRU, Russia’s military intelligence unit.

Via BleepingComputer

You might also like

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.