Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Malware

SickSync Malware Campaign

June 6, 2024
Reading Time: 3 mins read
in Malware, Malware Campaign
SickSync Malware Campaign

SickSync Campaign

Type of Threats

Malware Campaign

Malware Associated

SPECTR (Trojan)

Associated Groups

Vermin (UAC-0020)

Country of Origin

Russia

Targeted Countries

Ukraine

Date of initial activity

2024

Motivation

Cyberwarfare
Data Theft

Attack Vectors

Phishing

Targeted Systems

Windows

Type of information Stolen

Browser Data
Communication Data
Login credentials
System Information

Overview

On June 6, 2024, a new and sophisticated cyber threat emerged against the Armed Forces of Ukraine, identified as the “SickSync” campaign. This operation, attributed to the Vermin hacking group—also known as UAC-0020—represents a significant escalation in cyber espionage tactics, showcasing advanced methods and persistent efforts by adversaries. The SickSync campaign highlights the evolving nature of cyber threats and the need for heightened cybersecurity vigilance. The SickSync campaign involves the use of the SPECTR malware, a persistent component of the Vermin group’s toolkit since 2019. This malware is now being deployed in conjunction with SyncThing, a legitimate peer-to-peer synchronization utility, to covertly exfiltrate sensitive data from targeted military systems. By leveraging SyncThing’s legitimate functionality, the attackers blend their malicious activities with normal operations, complicating detection efforts and increasing the campaign’s effectiveness. The attack begins with a well-crafted phishing email containing a password-protected archive. This archive includes another layer of obfuscation through a RARSFX archive, which houses a decoy file alongside the malicious components: an executable file named “sync.exe” and a BAT file designed for initial execution. The “sync.exe” file merges legitimate SyncThing components with SPECTR malware, allowing the attackers to capture screenshots, steal files, and conduct data exfiltration operations. SyncThing’s peer-to-peer capabilities are misused to transfer stolen data to the attackers, illustrating a clever exploitation of a legitimate tool for nefarious purposes.

Targets

Public Administration

How they operate

The attack begins with a seemingly innocuous phishing email, which contains a password-protected archive attachment. This archive houses a secondary RARSFX archive with a decoy file labeled “Wowchok.pdf” and an executable file named “sync.exe.” The executable is crafted using the InnoSetup installer, and it is accompanied by a BAT file (“run_user.bat”) intended for initial execution. Once the user interacts with the malicious attachment, the “sync.exe” file is triggered. This file contains both legitimate SyncThing components and malicious SPECTR malware. SyncThing, a tool designed for peer-to-peer file synchronization, is subverted in this attack. The malware modifies SyncThing’s legitimate functionality to serve its nefarious goals. By embedding harmful SPECTR components within the SyncThing software, the attackers leverage the utility’s synchronization capabilities to exfiltrate stolen data. Key SPECTR modules include SpecMon, which executes DLL files, and a suite of tools for capturing screenshots, collecting files from directories and USB drives, and stealing data from various messengers and web browsers. The stolen data is saved in a specific directory (%APPDATA%\sync\Slave_Sync) and then transferred to the attackers via SyncThing’s synchronization features. The operation’s design reflects a high degree of sophistication. The attackers utilize a combination of legitimate software and advanced malware techniques to circumvent traditional security measures. The use of SyncThing for data exfiltration is particularly notable, as it disguises malicious activities within the framework of a commonly used application, thereby evading detection.

MITRE Tactics and Techniques

Initial Access Spearphishing Attachment (T1566.001): The attackers use a phishing email with a password-protected archive to deliver the malware. Execution from RAR Archive [WinRAR] (via process_creation): The archive includes an executable that is run to execute the malware. Execution Command and Scripting Interpreter: Visual Basic (T1059.005): The BAT file executed initially may use Visual Basic scripts to perform malicious actions. User Execution: Malicious File (T1204.002): The execution of the malicious file by the user triggers the malware. Possible Self-Extracting Archive was Executed (via file_event): Self-extracting archives are used to execute the malware. Possible 7Zip/RAR Self-Extracting Archive was Executed (via cmdline): This technique refers to executing the archive through command line arguments. Collection Data From Local System (T1005): The malware collects data from the local system, including screenshots and files. Suspicious Robocopy Execution (via cmdline): The malware uses Robocopy to copy files from specified directories and USB drives. Exfiltration Automated Exfiltration (T1020): The stolen data is automatically exfiltrated to the attacker’s infrastructure. Exfiltration Over Alternative Protocol (T1048): SyncThing is misused for data exfiltration over its protocol, which is normally used for legitimate file synchronization. References
  • UAC-0020 aka Vermin Attack Detection: SickSync Campaign Using SPECTR Malware and SyncThing Utility to Target the Armed Forces of Ukraine
Tags: Cyber threatMalwareMalware CampaignRussiaSickSyncTrojanUAC-0020Ukraine
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

Microsoft Defender Bug Allows SYSTEM Access

Uncanny Automator Bug Risks WordPress Sites

Devs Hit By PyPI Solana Token Secret Theft

Hackers Exploit Output Messenger Zero-Day

ASUS Fixes Critical Flaws in DriverHub

Apple Fixes Critical Bugs in iOS and MacOS

Subscribe to our newsletter

    Latest Incidents

    Alabama Cybersecurity Event Hits Services

    Andy Frain Data Breach Impacts 100k People

    Hong Kong DSC Hit By Ransomware Attack

    Alleged Steam Breach Exposes 89M Records

    Ulhasnagar Municipal Corporation Hacked

    Madison County Iowa Systems Disrupted

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial