Steelhook

Malware updated 23 days ago (2024-11-29T13:31:58.388Z)
Download STIX
Preview STIX
Steelhook is a malicious PowerShell script used by the Russia-linked Advanced Persistent Threat group, APT28, to steal sensitive information from compromised systems. The malware was discovered as part of a phishing campaign orchestrated by APT28, as reported by the Computer Emergency Response Team of Ukraine (CERT-UA) in December 2023. Once installed on a system, Steelhook can extract data from web browsers, including login credentials, authentication cookies, and browsing history. This data is then exported to an actor-controlled server in Base64-encoded format. Steelhook specifically targets Google Chrome and Microsoft Edge browsers. The APT28 group has been employing Steelhook along with other previously undetected malware, such as OCEANMAP and MASEPIE, to infiltrate and exfiltrate sensitive data from targeted networks. These include Ukrainian government entities and Polish organizations. The threat actors also utilized the MASEPIE malware to load and execute OPENSSH for building a tunnel, and the OCEANMAP backdoor. In this campaign, the hackers leveraged these tools to upload the data-stealing malware Steelhook and a backdoor called Oceanmap, which manipulates email software. In response to these threats, Recorded Future employed a technique that altered Steelhook, submitting the malware source code to an LLM system. This action likely disrupted the functionality of the malware within infected systems. However, the attacks have paved the way for the deployment of additional malicious software, further escalating the cyber threat landscape. It's crucial for organizations to remain vigilant against such sophisticated threats and ensure robust cybersecurity measures are in place.
Description last updated: 2024-05-04T20:49:59.152Z
What's your take? (Question 1 of 4)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
OCEANMAP is a possible alias for Steelhook. OceanMap is a C#-based malware used by APT28, a Russia-linked group, as part of a sophisticated cyber attack campaign that started in 2020. The malware is designed to execute base64-encoded commands via cmd.exe, providing persistent and remote access to the targeted endpoint. Once a command is execu
3
Masepie is a possible alias for Steelhook. MASEPIE is a malicious software (malware) first discovered in December 2023, which is capable of establishing persistence on Windows machines and executing arbitrary commands. It is described as a small Python backdoor that enables the downloading and uploading of files. When victims click to view l
3
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Backdoor
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
Alias DescriptionAssociation TypeVotes
The APT28 Threat Actor is associated with Steelhook. APT28, also known as Fancy Bear, Pawn Storm, Sofacy Group, Sednit, and STRONTIUM, is a threat actor linked to Russia. The group has been associated with cyber espionage campaigns across Central Asia and has historically targeted areas of national security, military operations, and geopolitical influUnspecified
2