Cybercriminals often target financial institutions due to their valuable assets, including money, intellectual property, and sensitive customer information. These attacks can result in monetary gain through theft, blackmail, or disruption of services. Palo Alto Networks researchers recently uncovered Smoke Loader malware targeting financial institutions running Microsoft Windows, particularly impacting Ukraine amidst escalating cyberattacks during regional conflict. Smoke Loader, also known as Dofoil or Sharik, functions as a Windows backdoor with info-stealing capabilities and has been globally documented spreading via emails and web exploits.
The surge of cyberattacks in Ukraine from May to November 2023, facilitated by Smoke Loader malware, underscores the vulnerability of financial and government organizations in times of conflict. SCPC SSSCIP identified Smoke Loader as a prominent malware strain in recent attacks, signaling a coordinated disruptive effort by global threat actors exploiting the situation. This versatile malware, advertised since 2011, has evolved to become a prime candidate in reported Ukrainian incidents, deployed by suspected Russian cybercrime groups aiming to steal tens of millions of hryvnias from Ukrainian enterprises.
Cert-UA’s alerts on Smoke Loader activity, particularly driven by UAC-0006, highlight the severity of the threat, with Ukraine’s financial crime ranks soaring by December 2023. The SCPC SSSCIP report detailing 23 Smoke Loader attack waves from May to December 2023 provides crucial insights into attack vectors, payloads, and objectives, aiding in defense strategies. Prioritizing security measures and fostering smart online habits are essential steps to defend against such threats, as highlighted in joint research efforts to disrupt the attack chain and mitigate potential losses for Ukrainian organizations.