Lunarweb

Threat Actor updated 3 days ago (2024-10-15T10:01:14.139Z)
Download STIX
Preview STIX
LunarWeb is a sophisticated threat actor identified by ESET researchers, linked to Russian state interests. The group was first observed in 2020 and has been associated with two previously unknown backdoors, LunarWeb and LunarMail, which were utilized to breach the European Ministry of Foreign Affairs (MFA) and its diplomatic missions abroad. LunarWeb is deployed on servers and uses HTTP(S) for its Command & Control (C&C) communications, mimicking legitimate requests, while LunarMail is deployed on workstations as an Outlook add-in and uses email messages for its C&C communications. These backdoors have shown advanced capabilities like steganography and Lua scripting. The LunarWeb component demonstrated complex evasion techniques, including impersonating Zabbix logs and retrieving Zabbix agent configuration. It also employs multiple persistence methods such as creating Group Policy extensions, replacing System DLLs, and deploying as part of legitimate software. To further conceal its activities, LunarWeb spoofs HTTP headers with genuine domains and commonly used attributes to mimic legitimate-looking traffic. In addition, LunarWeb can execute shell and PowerShell commands, gather system information, run Lua code, and exfiltrate data in AES-256 encrypted form. ESET's research revealed that LunarWeb had been simultaneously deployed at three diplomatic institutions of the MFA in the Middle East within minutes of each other, suggesting that the attacker likely had prior access to the domain controller of the MFA and used it for lateral movement to machines of related institutions in the same network. This level of coordination and sophistication underscores the significant threat posed by LunarWeb, necessitating robust cybersecurity measures to mitigate potential damage.
Description last updated: 2024-10-15T09:21:30.235Z
What's your take? (Question 1 of 3)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Outlook
Backdoor
PowerShell
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
Alias DescriptionAssociation TypeVotes
The Lunarmail Threat Actor is associated with Lunarweb. LunarMail, a novel backdoor linked to the Russia-associated Turla APT, has been discovered by ESET researchers as part of a cyber-espionage campaign targeting European government agencies. First observed in 2020, this sophisticated threat actor leverages two custom backdoors, LunarWeb and LunarMail,Unspecified
3
Source Document References
Information about the Lunarweb Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more