HomeCyberSecurity NewsNew SingleCamper RAT Variant in Russian RomCom Aims at Ukrainian Government

New SingleCamper RAT Variant in Russian RomCom Aims at Ukrainian Government

The Russian threat actor known as RomCom has been tied to a recent series of cyber attacks targeting Ukrainian government agencies and unidentified Polish entities since at least late 2023.

The breaches involve the use of a variant of the RomCom RAT called SingleCamper (also known as SnipBot or RomCom 5.0), according to Cisco Talos, who is tracking the activity cluster as UAT-5647.

“This version is loaded directly from the registry into memory and uses a loopback address to communicate with its loader,” noted security researchers Dmytro Korzhevin, Asheer Malhotra, Vanja Svajcer, and Vitor Ventura stated.



RomCom, also known as Storm-0978, Tropical Scorpius, UAC-0180, UNC2596, and Void Rabisu, has been involved in multi-purpose operations such as ransomware, extortion, and targeted credential theft since it first appeared in 2022.

The pace of their attacks has reportedly accelerated in recent months, with a focus on establishing long-term control over compromised networks and extracting data, indicating a clear espionage agenda.

The threat actor is expanding its toolset and infrastructure to accommodate a variety of malware components written in different languages and platforms, including C++ (ShadyHammock), Rust (DustyHammock), Go (GLUEEGG), and Lua (DROPCLUE).

The attack sequence begins with a spear-phishing message that distributes a downloader in C++ (MeltingClaw) or Rust (RustyClaw), which then deploys ShadyHammock and DustyHammock backdoors. Simultaneously, a decoy document is presented to the recipient to maintain deception.

While DustyHammock communicates with a command-and-control (C2) server, executes commands, and downloads files, ShadyHammock serves as a platform for SingleCamper and listens for incoming directives.

Although ShadyHammock has additional functionalities, it is considered a precursor to DustyHammock, as the latter was observed in attacks as recently as September 2024.



SingleCamper, the latest iteration of RomCom RAT, carries out various post-compromise activities, including downloading PuTTY’s Plink tool to create remote tunnels with adversary-controlled infrastructure, network scanning, lateral movement, user and system identification, and data exfiltration.

“These specific attacks, targeting prominent Ukrainian entities, are likely part of UAT-5647’s dual strategy of establishing long-term access for espionage purposes and extracting data for as long as possible, with a potential shift to ransomware deployment for disruption and financial gain,” the researchers stated.

“It is probable that Polish entities were also targeted, based on the malware’s keyboard language checks.”

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest News