{"id":21381,"date":"2022-09-29T02:42:00","date_gmt":"2022-09-29T02:42:00","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=21381"},"modified":"2026-04-17T18:07:43","modified_gmt":"2026-04-17T18:07:43","slug":"apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\/","title":{"rendered":"APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 2)"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p>Part 1:   <a href=\"https:\/\/nsfocusglobal.com\/pt-br\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\/\">APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 1)<\/a><\/p>\n\n\n\n<p><strong>Type 2: Send malicious HTML attachments by masquerading notification emails<\/strong><\/p>\n\n\n\n<p>The second type of attack activity Gamaredon mainly carried out is spear phishing emails.<\/p>\n\n\n\n<p>This is a new attack process that emerged in the second quarter of this year. Gamaredon attackers placed layers of malicious attachments in spear phishing emails and tricked victims into opening them with carefully constructed email content. This type of attack mainly targets Ukrainian military personnel.<\/p>\n\n\n\n<p>Here we take a spear phishing email found on July 26 titled &#8220;&ETH;&dagger;&ETH;&frac12;&Ntilde;&bdquo;&ETH;&frac34;&Ntilde;&euro;&ETH;&frac14;&ETH;&deg;&Ntilde;&dagger;&Ntilde;&ndash;&ETH;&sup1;&ETH;&frac12;&ETH;&cedil;&ETH;&sup1; &ETH;&plusmn;&Ntilde;&#381;&ETH;&raquo;&ETH;&micro;&Ntilde;&sbquo;&ETH;&micro;&ETH;&frac12;&Ntilde;&OElig;.eml&#8221; for example. In this email, Gamaredon disguises itself as the National Academy of the Security Service of Ukraine (&ETH;&ETH;&deg;&Ntilde;&dagger;&Ntilde;&ndash;&ETH;&frac34;&ETH;&frac12;&ETH;&deg;&ETH;&raquo;&Ntilde;&OElig;&ETH;&frac12;&ETH;&deg; &ETH;&deg;&ETH;&ordm;&ETH;&deg;&ETH;&acute;&ETH;&micro;&ETH;&frac14;&Ntilde;&ndash;&Ntilde; &ETH;&iexcl;&ETH;&lsquo;&ETH;&pound;). It claimed that the email was &#8220;a security announcement of the counter-intelligence department of the Security Service of Ukraine on July 25, 2022&#8221;. The content of the email is deceptive, as the Security Service of Ukraine does undertake the work f anti-cyber espionage.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-5-Type-2-Decoy-email-3.png\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-5-Type-2-Decoy-email-3.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21388\" width=\"603\" height=\"383\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-5-Type-2-Decoy-email-3.png 567w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-5-Type-2-Decoy-email-3-300x190.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-5-Type-2-Decoy-email-3-200x127.png 200w\" sizes=\"(max-width: 603px) 100vw, 603px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\">Figure 5 Type 2 &#8211; Decoy email<\/p>\n\n\n\n<p>The email carries an attachment named &#8220;&ETH;&dagger;&ETH;&frac12;&Ntilde;&bdquo;&ETH;&frac34;&Ntilde;&euro;&ETH;&frac14;&ETH;&deg;&Ntilde;&dagger;&Ntilde;&ndash;&ETH;&sup1;&ETH;&frac12;&ETH;&cedil;&ETH;&sup1; &ETH;&plusmn;&Ntilde;&#381;&ETH;&raquo;&ETH;&micro;&Ntilde;&sbquo;&ETH;&micro;&ETH;&frac12;&Ntilde;&OElig;_25.07.2022.htm&#8221;.The main function of the HTM file is to release a built-in compressed file and open it. The compressed file contains a malicious shortcut file named &#8220;&ETH;&dagger;&ETH;&frac12;&Ntilde;&bdquo;&ETH;&frac34;&Ntilde;&euro;&ETH;&frac14;&ETH;&deg;&Ntilde;&dagger;&Ntilde;&ndash;&ETH;&sup1;&ETH;&frac12;&ETH;&cedil;&ETH;&sup1; &ETH;&plusmn;&Ntilde;&#381;&ETH;&raquo;&ETH;&micro;&Ntilde;&sbquo;&ETH;&micro;&ETH;&frac12;&Ntilde;&OElig; &ETH;&rdquo;&ETH;&micro;&ETH;&iquest;&ETH;&deg;&Ntilde;&euro;&Ntilde;&sbquo;&ETH;&deg;&ETH;&frac14;&ETH;&micro;&ETH;&frac12;&Ntilde;&sbquo;&Ntilde;&fnof; &ETH;&ordm;&ETH;&frac34;&ETH;&frac12;&Ntilde;&sbquo;&Ntilde;&euro;&ETH;&frac34;&ETH;&middot;&ETH;&sup2;&Ntilde;&ndash;&ETH;&acute;&ETH;&ordm;&ETH;&cedil; &ETH;&iexcl;&ETH;&raquo;&Ntilde;&fnof;&ETH;&para;&ETH;&plusmn;&ETH;&cedil; &ETH;&plusmn;&ETH;&micro;&ETH;&middot;&ETH;&iquest;&ETH;&micro;&ETH;&ordm;&Ntilde;&sbquo;&Ntilde;&fnof; &Ntilde;&ndash;&ETH;&sup1;&ETH;&frac12;&ETH;&cedil;&ETH;&sup1; &ETH;&plusmn;&Ntilde;&#381;&ETH;&raquo;&ETH;&micro;&Ntilde;&sbquo;&ETH;&micro;&ETH;&frac12;&Ntilde;&OElig; &ETH;&rdquo;&ETH;&micro;&ETH;&iquest;&ETH;&deg;&Ntilde;&euro;&Ntilde;&sbquo;&ETH;&deg;&ETH;&frac14;&ETH;&micro;&ETH;&frac12;&Ntilde;&sbquo;&Ntilde;&fnof; &ETH;&ordm;&ETH;&frac34;&ETH;&frac12;&Ntilde;&sbquo;&Ntilde;&euro;&ETH;&frac34;&ETH;&middot;&ETH;&sup2;&Ntilde;&ndash;&ETH;&acute;&ETH;&ordm;&ETH;&cedil; &ETH;&iexcl;&ETH;&raquo;&Ntilde;&fnof;&ETH;&para;&ETH;&plusmn;&ETH;&cedil; &ETH;&plusmn;&ETH;&micro;&ETH;&middot;&ETH;&iquest;&ETH;&micro;&ETH;&ordm;&ETH;&cedil; &ETH;&pound;&ETH;&ordm;&Ntilde;&euro;&ETH;&deg;&Ntilde;&mdash;&ETH;&frac12;&ETH;&cedil; &ETH;&sup2;&Ntilde;&ndash;&ETH;&acute; 25 &ETH;&raquo;&ETH;&cedil;&ETH;&iquest;&ETH;&frac12;&Ntilde; 2022 &Ntilde;&euro;&ETH;&frac34;&ETH;&ordm;&Ntilde;&fnof;.lnk&#8221;.<\/p>\n\n\n\n<p>The above malicious shortcut file will download a subsequent attack payload located at http:\/\/a0698649.xsph.ru\/selection\/headache.xml, and then run it. In similar attacks that have been captured, the subsequent attack payload is typically a powershell backdoor made by Gamaredon to steal information from the victim&#8217;s host.<\/p>\n\n\n\n<p>We counted the names of decoys appearing in such emails and found that most of them were related to key Ukrainian military intelligence, reflecting the Gamaredon attackers&#8217; in-depth understanding of the Ukrainian military&#8217;s establishment, order numbers, document numbers, and other content.<\/p>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\">Table 1 Statistics of decoy file names used in Type 2 attacks<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Table-1-Statistics-of-decoy-file-names-used-in-Type-2-attacks-1-1.png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Table-1-Statistics-of-decoy-file-names-used-in-Type-2-attacks-1-1.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21392\" width=\"746\" height=\"602\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Table-1-Statistics-of-decoy-file-names-used-in-Type-2-attacks-1-1.png 926w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Table-1-Statistics-of-decoy-file-names-used-in-Type-2-attacks-1-1-300x242.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Table-1-Statistics-of-decoy-file-names-used-in-Type-2-attacks-1-1-768x620.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Table-1-Statistics-of-decoy-file-names-used-in-Type-2-attacks-1-1-600x485.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Table-1-Statistics-of-decoy-file-names-used-in-Type-2-attacks-1-1-200x162.png 200w\" sizes=\"(max-width: 746px) 100vw, 746px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p><strong>Type 3: plant remote Trojans using SFX self-extracting files as baits<\/strong><\/p>\n\n\n\n<p>The third type of attack Gamaredon relies on is the SFX self-extracting file. This type of attack also targets the Ukrainian military.<\/p>\n\n\n\n<p>This is an attack technique that has emerged in large numbers this year. Gamaredon combines a remote desktop tool called UltraVNC with the group&#8217;s commonly-used SFX decoy to control the target systems remotely.<\/p>\n\n\n\n<p>A typical SFX self-extracting file has a name like &#8220;&ETH;&nbsp;&ETH;&micro;&ETH;&middot;&Ntilde;&#381;&ETH;&frac14;&ETH;&micro; &ETH;&ordm;&ETH;&deg;&ETH;&frac12;&ETH;&acute;&ETH;&cedil;&ETH;&acute;&ETH;&deg;&Ntilde;&sbquo;&ETH;&deg; &ETH;&frac12;&ETH;&deg; &ETH;&acute;&ETH;&frac34;&ETH;&raquo;&ETH;&para;&ETH;&frac12;&ETH;&frac34;&Ntilde;&Ntilde;&sbquo;&Ntilde;&OElig; &ETH;&rsquo;&ETH;&Yuml;&ETH;&scaron;.docx.exe_&#8221; Resume of the candidate for the military-industrial consortium position), using the extension to trick victims into running the file.<\/p>\n\n\n\n<p>This type of self-extracting file contains several sub-files, including the UltraVNC remote desktop tool, the command file and ini configuration file for configuring the tool, and a decoy file.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-6-Type-3_Content-of-a-SFX-File.png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-6-Type-3_Content-of-a-SFX-File-1024x407.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21394\" width=\"719\" height=\"285\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-6-Type-3_Content-of-a-SFX-File-1024x407.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-6-Type-3_Content-of-a-SFX-File-300x119.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-6-Type-3_Content-of-a-SFX-File-768x305.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-6-Type-3_Content-of-a-SFX-File-600x238.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-6-Type-3_Content-of-a-SFX-File-200x79.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-6-Type-3_Content-of-a-SFX-File.png 1319w\" sizes=\"(max-width: 719px) 100vw, 719px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\">Figure 6 Type 3 &#8211; Content of an SFX file<\/p>\n\n\n\n<p>The C&amp;C server of this UltraVNC in the relevant configuration file is licensecheckout[.] com.<\/p>\n\n\n\n<p>The decoy file named &#8220;kandidat.docx&#8221; shows a resume of a Russian.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-7-Type-3-A-decoy-document.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-7-Type-3-A-decoy-document-1024x685.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21396\" width=\"719\" height=\"479\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-7-Type-3-A-decoy-document-300x201.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-7-Type-3-A-decoy-document-600x401.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-7-Type-3-A-decoy-document-200x134.png 200w\" sizes=\"(max-width: 719px) 100vw, 719px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\">Figure 7 Type 3 &#8211; A decoy document<\/p>\n\n\n\n<p>Most other similar documents contain military information, such as the Russian military pay adjustment document shown below.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-8-Type-3-Another-decoy-document.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-8-Type-3-Another-decoy-document-1024x605.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21398\" width=\"725\" height=\"428\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-8-Type-3-Another-decoy-document-1024x605.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-8-Type-3-Another-decoy-document-300x177.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-8-Type-3-Another-decoy-document-768x454.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-8-Type-3-Another-decoy-document-600x355.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-8-Type-3-Another-decoy-document-200x118.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-8-Type-3-Another-decoy-document.png 1299w\" sizes=\"(max-width: 725px) 100vw, 725px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\">Figure 8 Type 3 &#8211; Another decoy document<\/p>\n\n\n\n<p>The decoy document demonstrates how the third type of attack differs from Gamaredon&#8217;s other attack activities. Among the similar samples we found, Gamaredon has added decoy files written in Russian, specifically containing sensitive information about the Russian government and military. It can be assumed that the direct targets of such attacks are Ukrainian organizations interested in such sensitive information, most likely including intelligence agencies such as the Security Service of Ukraine.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Summary<\/strong><\/h2>\n\n\n\n<p>As the war situation entered a new phase, Russia and Ukraine launched a long-term tug-of-war in northern Kherson, northeastern Zaporozhye, western Donetsk, and northwestern Luhansk.&nbsp; The group Gamaredon also remained active in these regions, continuing to increase its cyber offensive against military, police, and other targets in these areas, with a clear spike in late July.<\/p>\n\n\n\n<p>In the current round of cyberattacks, which began in the second quarter, Gamaredon has made a clear distinction between the various types of attacks, such as malicious office files mainly targeting police departments in Ukraine&#8217;s&Acirc;&nbsp;east, malicious shortcut attachments targeting the Ukrainian military, and malicious SFX files always carrying decoys on Russian military information, although there are occasional instances of exchanging the targets. This phenomenon suggests that there is a clear division of labor and a small amount of coordination within the Gamaredon group. The similarities between the above attacks lie in their carefully crafted decoy text messages, which demonstrate Gamaredon&#8217;s deep understanding of the Ukrainian environment and changes in the Ukrainian military. These elements probably came from the accumulation of Gamaredon&#8217;s long-term intelligence operations, and also present the strong social engineering and intelligence gathering capabilities.<\/p>\n\n\n\n<p>Read more about the APT Group Gamaredon: <\/p>\n\n\n\n<p><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/russian-apt-group-gamaredon-launches-phishing-campaign-against-ukrainian-ministry-of-foreign-affairs\/\" target=\"_blank\" rel=\"noreferrer noopener\">Russian APT Group Gamaredon Launches Phishing Campaign against Ukrainian Ministry of Foreign Affairs<\/a><\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Part 1: APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 1) Type 2: Send malicious HTML attachments by masquerading notification emails The second type of attack activity Gamaredon mainly carried out is spear phishing emails. This is a new attack process that emerged in the second quarter of this year. Gamaredon attackers placed layers [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":21371,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[94],"class_list":["post-21381","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-apt-group"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 2) - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 2) - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Part 1: APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 1) Type 2: Send malicious HTML attachments by masquerading notification emails\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-29T02:42:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Gamaredon-e1664167669467.png\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 2) - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Part 1: APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 1) Type 2: Send malicious HTML attachments by masquerading notification emails\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Gamaredon-e1664167669467.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 2)\",\"datePublished\":\"2022-09-29T02:42:00+00:00\",\"dateModified\":\"2026-04-17T18:07:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\\\/\"},\"wordCount\":1215,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/Gamaredon-e1664167669467.png\",\"keywords\":[\"APT Group;\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\\\/\",\"name\":\"APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 2) - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/Gamaredon-e1664167669467.png\",\"datePublished\":\"2022-09-29T02:42:00+00:00\",\"dateModified\":\"2026-04-17T18:07:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/Gamaredon-e1664167669467.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/Gamaredon-e1664167669467.png\",\"width\":300,\"height\":125,\"caption\":\"Hooded figure with \\\"Gamaredon APT Group\\\" text.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 2)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 2) - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\/","og_locale":"pt_BR","og_type":"article","og_title":"APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 2) - NSFOCUS","og_description":"Part 1: APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 1) Type 2: Send malicious HTML attachments by masquerading notification emails","og_url":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\/","og_site_name":"NSFOCUS","article_published_time":"2022-09-29T02:42:00+00:00","article_modified_time":"2026-04-17T18:07:43+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Gamaredon-e1664167669467.png","type":"","width":"","height":""}],"author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 2) - NSFOCUS","twitter_description":"Part 1: APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 1) Type 2: Send malicious HTML attachments by masquerading notification emails","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Gamaredon-e1664167669467.png","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 2)","datePublished":"2022-09-29T02:42:00+00:00","dateModified":"2026-04-17T18:07:43+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\/"},"wordCount":1215,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Gamaredon-e1664167669467.png","keywords":["APT Group;"],"articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\/","url":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\/","name":"APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 2) - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Gamaredon-e1664167669467.png","datePublished":"2022-09-29T02:42:00+00:00","dateModified":"2026-04-17T18:07:43+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Gamaredon-e1664167669467.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Gamaredon-e1664167669467.png","width":300,"height":125,"caption":"Hooded figure with \"Gamaredon APT Group\" text."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 2)"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/21381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=21381"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/21381\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/21371"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=21381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=21381"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=21381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}