Ember Bear

Ember Bear is a Russian state-sponsored cyber espionage group that has been active since at least 2020, linked to Russia's General Staff Main Intelligence Directorate (GRU) 161st Specialist Training Center (Unit 29155).[1] Ember Bear has primarily focused operations against Ukrainian government and telecommunication entities, but has also operated against critical infrastructure entities in Europe and the Americas.[2] Ember Bear conducted the WhisperGate destructive wiper attacks against Ukraine in early 2022.[3][4][1] There is some confusion as to whether Ember Bear overlaps with another Russian-linked entity referred to as Saint Bear. At present available evidence strongly suggests these are distinct activities with different behavioral profiles.[2][5]

ID: G1003
Associated Groups: UNC2589, Bleeding Bear, DEV-0586, Cadet Blizzard, Frozenvista, UAC-0056
Contributors: Hannah Simes, BT Security
Version: 2.0
Created: 09 June 2022
Last Modified: 06 September 2024

Associated Group Descriptions

Name Description
UNC2589

[4]

Bleeding Bear

[3]

DEV-0586

[2]

Cadet Blizzard

[2]

Frozenvista

[1]

UAC-0056

[1]

Techniques Used

Domain ID Name Use
Enterprise T1047 Windows管理规范

Ember Bear has used WMI execution with password hashes for command execution and lateral movement.[1]

Enterprise T1595 .001 主动扫描: Scanning IP Blocks

Ember Bear has targeted IP ranges for vulnerability scanning related to government and critical infrastructure organizations.[1]

.002 主动扫描: Vulnerability Scanning

Ember Bear has used publicly available tools such as MASSCAN and Acunetix for vulnerability scanning of public-facing infrastructure.[1]

Enterprise T1005 从本地系统获取数据

Ember Bear gathers victim system information such as enumerating the volume of a given device or extracting system and security event logs for analysis.[2][1]

Enterprise T1090 .003 代理: Multi-hop Proxy

Ember Bear has configured multi-hop proxies via ProxyChains within victim environments.[1]

Enterprise T1036 伪装

Ember Bear has renamed the legitimate Sysinternals tool procdump to alternative names such as dump64.exe to evade detection.[2]

.005 Match Legitimate Name or Location

Ember Bear has renamed tools to match legitimate utilities, such as renaming GOST tunneling instances to java in victim environments.[1]

Enterprise T1550 .002 使用备用认证材料: Pass the Hash

Ember Bear has used pass-the-hash techniques for lateral movement in victim environments.[1]

Enterprise T1195 供应链破坏

Ember Bear has compromised information technology providers and software developers providing services to targets of interest, building initial access to ultimate victims at least in part through compromise of service providers that work with the victim organizations.[2]

Enterprise T1112 修改注册表

Ember Bear modifies registry values for anti-forensics and defense evasion purposes.[2]

Enterprise T1190 利用公开应用程序漏洞

Ember Bear gains initial access to victim environments by exploiting external-facing services. Examples include exploitation of CVE-2021-26084 in Confluence servers; CVE-2022-41040, ProxyShell, and other vulnerabilities in Microsoft Exchange; and multiple vulnerabilities in open-source platforms such as content management systems.[2][1]

Enterprise T1572 协议隧道

Ember Bear has used ProxyChains to tunnel protocols to internal networks.[1]

Enterprise T1059 .001 命令与脚本解释器: PowerShell

Ember Bear has used PowerShell commands to gather information from compromised systems, such as email servers.[1]

Enterprise T1133 外部远程服务

Ember Bear have used VPNs both for initial access to victim environments and for persistence within them following compromise.[1]

Enterprise T1562 .001 妨碍防御: Disable or Modify Tools

Ember Bear uses the NirSoft AdvancedRun utility to disable Microsoft Defender Antivirus through stopping the WinDefend service on victim machines. Ember Bear disables Windows Defender via registry key changes.[2]

Enterprise T1203 客户端执行漏洞利用

Ember Bear has used exploits to enable follow-on execution of frameworks such as Meterpreter.[1]

Enterprise T1071 .004 应用层协议: DNS

Ember Bear has used DNS tunnelling tools, such as dnscat/2 and Iodine, for C2 purposes.[1]

Enterprise T1585 建立账户

Ember Bear has created accounts on dark web forums to obtain various tools and malware.[1]

Enterprise T1560 归档收集数据

Ember Bear has compressed collected data prior to exfiltration.[1]

Enterprise T1003 操作系统凭证转储

Ember Bear gathers credential material from target systems, such as SSH keys, to facilitate access to victim environments.[2]

.001 LSASS Memory

Ember Bear uses legitimate Sysinternals tools such as procdump to dump LSASS memory.[2][1]

.002 Security Account Manager

Ember Bear acquires victim credentials by extracting registry hives such as the Security Account Manager through commands such as reg save.[2][1]

.004 LSA Secrets

Ember Bear has used frameworks such as Impacket to dump LSA secrets for credential capture.[1]

Enterprise T1654 日志枚举

Ember Bear has enumerated SECURITY and SYSTEM log files during intrusions.[1]

Enterprise T1110 暴力破解

Ember Bear used the su-bruteforce tool to brute force specific users using the su command.[1]

.003 Password Spraying

Ember Bear has conducted password spraying against Outlook Web Access (OWA) infrastructure to identify valid user names and passwords.[1]

Enterprise T1078 .001 有效账户: Default Accounts

Ember Bear has abused default user names and passwords in externally-accessible IP cameras for initial access.[1]

Enterprise T1505 .003 服务器软件组件: Web Shell

Ember Bear deploys web shells following initial access for either follow-on command execution or protocol tunneling. Example web shells used by Ember Bear include P0wnyshell, reGeorg, P.A.S. Webshell, and custom variants of publicly-available web shell examples.[2][1]

Enterprise T1552 .001 未加密凭证: Credentials In Files

Ember Bear has dumped configuration settings in accessed IP cameras including plaintext credentials.[1]

Enterprise T1570 横向工具传输

Ember Bear retrieves follow-on payloads direct from adversary-owned infrastructure for deployment on compromised hosts.[2]

Enterprise T1114 电子邮件收集

Ember Bear attempts to collect mail from accessed systems and servers.[2][1]

Enterprise T1561 .002 磁盘擦除: Disk Structure Wipe

Ember Bear conducted destructive operations against victims, including disk structure wiping, via the WhisperGate malware in Ukraine.[2]

Enterprise T1070 .004 移除指标: File Deletion

Ember Bear deletes files related to lateral movement to avoid detection.[2]

Enterprise T1491 .002 篡改: External Defacement

Ember Bear is linked to the defacement of several Ukrainian organization websites.[2]

Enterprise T1046 网络服务发现

Ember Bear has used tools such as NMAP for remote system discovery and enumeration in victim environments.[1]

Enterprise T1119 自动化收集

Ember Bear engages in mass collection from compromised systems during intrusions.[2]

Enterprise T1583 获取基础设施

Ember Bear uses services such as IVPN, SurfShark, and Tor to add anonymization to operations.[2]

.003 Virtual Private Server

Ember Bear has used virtual private servers (VPSs) to host tools, perform reconnaissance, exploit victim infrastructure, and as a destination for data exfiltration.[1]

Enterprise T1588 .001 获取能力: Malware

Ember Bear has acquired malware and related tools from dark web forums.[1]

.005 获取能力: Exploits

Ember Bear has obtained exploitation scripts against publicly-disclosed vulnerabilities from public repositories.[1]

Enterprise T1125 视频捕获

Ember Bear has exfiltrated images from compromised IP cameras.[1]

Enterprise T1021 远程服务

Ember Bear uses valid network credentials gathered through credential harvesting to move laterally within victim networks, often employing the Impacket framework to do so.[2]

Enterprise T1210 远程服务漏洞利用

Ember Bear has used exploits for vulnerabilities such as MS17-010, also known as Eternal Blue, during operations.[1]

Enterprise T1018 远程系统发现

Ember Bear has used tools such as Nmap and MASSCAN for remote service discovery.[1]

Enterprise T1567 .002 通过网络服务渗出: Exfiltration to Cloud Storage

Ember Bear has used tools such as Rclone to exfiltrate information from victim environments to cloud storage such as mega.nz.[1]

Enterprise T1095 非应用层协议

Ember Bear uses socket-based tunneling utilities for command and control purposes such as NetCat and Go Simple Tunnel (GOST). These tunnels are used to push interactive command prompts over the created sockets.[2] Ember Bear has also used reverse TCP connections from Meterpreter installations to communicate back with C2 infrastructure.[1]

Enterprise T1571 非标准端口

Ember Bear has used various non-standard ports for C2 communication.[1]

Enterprise T1053 .005 预定任务/作业: Scheduled Task

Ember Bear uses remotely scheduled tasks to facilitate remote command execution on victim machines.[2]

Software

ID Name References Techniques
S0521 BloodHound Ember Bear has used BloodHound to profile Active Directory environments.[1] 命令与脚本解释器: PowerShell, 域信任发现, 密码策略发现, 归档收集数据, 本机API, 权限组发现: Domain Groups, 权限组发现: Local Groups, 系统所有者/用户发现, 组策略发现, 账号发现: Domain Account, 账号发现: Local Account, 远程系统发现
S0488 CrackMapExec Ember Bear used CrackMapExec during intrusions.[1] Windows管理规范, 使用备用认证材料: Pass the Hash, 修改注册表, 命令与脚本解释器: PowerShell, 密码策略发现, 操作系统凭证转储: Security Account Manager, 操作系统凭证转储: NTDS, 操作系统凭证转储: LSA Secrets, 文件和目录发现, 暴力破解: Password Spraying, 暴力破解: Password Guessing, 暴力破解, 权限组发现: Domain Groups, 系统信息发现, 系统网络连接发现, 系统网络配置发现, 网络共享发现, 账号发现: Domain Account, 远程系统发现, 预定任务/作业: At
S0357 Impacket Ember Bear has used Impacket for lateral movement and process execution in victim environments.[2][1] Windows管理规范, 中间人攻击: LLMNR/NBT-NS Poisoning and SMB Relay, 操作系统凭证转储: NTDS, 操作系统凭证转储: LSASS Memory, 操作系统凭证转储: Security Account Manager, 操作系统凭证转储: LSA Secrets, 窃取或伪造Kerberos票据: Kerberoasting, 窃取或伪造Kerberos票据: Ccache Files, 系统服务: Service Execution, 网络嗅探
S0508 ngrok Ember Bear used ngrok during intrusions against Ukrainian victims.[2] 代理, 动态解析: Domain Generation Algorithms, 协议隧道, 网络服务, 通过网络服务渗出
S0598 P.A.S. Webshell Ember Bear has used P.A.S. Webshell during intrusions.[1] 从信息存储库获取数据, 从本地系统获取数据, 反混淆/解码文件或信息, 命令与脚本解释器, 应用层协议: Web Protocols, 文件和目录发现, 文件和目录权限修改: Linux and Mac File and Directory Permissions Modification, 暴力破解: Password Guessing, 服务器软件组件: Web Shell, 混淆文件或信息, 移除指标: File Deletion, 网络服务发现, 账号发现: Local Account, 软件发现, 输入工具传输
S0029 PsExec Ember Bear has used PsExec through frameworks such as Impacket for remote command execution.[1] 创建或修改系统进程: Windows Service, 创建账户: Domain Account, 横向工具传输, 系统服务: Service Execution, 远程服务: SMB/Windows Admin Shares
S1040 Rclone Ember Bear has used Rclone to exfiltrate information from victim environments.[1] 归档收集数据: Archive via Utility, 数据传输大小限制, 文件和目录发现, 替代协议渗出: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol, 替代协议渗出: Exfiltration Over Unencrypted Non-C2 Protocol, 通过网络服务渗出: Exfiltration to Cloud Storage
S0174 Responder Ember Bear has used Responder in intrusions.[1] 中间人攻击: LLMNR/NBT-NS Poisoning and SMB Relay, 网络嗅探
S1018 Saint Bot Ember Bear has used Saint Bot during operations, but is distinct from the threat actor Saint Bear.[1] 从本地系统获取数据, 伪装, 伪装: Match Legitimate Name or Location, 劫持执行流, 反混淆/解码文件或信息, 启动或登录自动启动执行: Registry Run Keys / Startup Folder, 命令与脚本解释器: Windows Command Shell, 命令与脚本解释器: Visual Basic, 命令与脚本解释器: PowerShell, 应用层协议: Web Protocols, 数据编码: Standard Encoding, 文件和目录发现, 本机API, 查询注册表, 混淆文件或信息, 混淆文件或信息: Software Packing, 滥用权限提升控制机制: Bypass User Account Control, 用户执行: Malicious File, 用户执行: Malicious Link, 移除指标: File Deletion, 系统二进制代理执行: Regsvr32, 系统二进制代理执行: InstallUtil, 系统位置发现, 系统信息发现, 系统所有者/用户发现, 系统网络配置发现, 虚拟化/沙盒规避: Time Based Evasion, 虚拟化/沙盒规避: System Checks, 调试器规避, 输入工具传输, 进程发现, 进程注入: Dynamic-link Library Injection, 进程注入: Asynchronous Procedure Call, 进程注入: Process Hollowing, 钓鱼: Spearphishing Link, 钓鱼: Spearphishing Attachment, 预定任务/作业: Scheduled Task
S0689 WhisperGate Ember Bear is associated with WhisperGate use against multiple victims in Ukraine.[2][3][4] 伪装, 反射性代码加载, 反混淆/解码文件或信息, 命令与脚本解释器: PowerShell, 命令与脚本解释器: Windows Command Shell, 命令与脚本解释器: Visual Basic, 妨碍防御: Disable or Modify Tools, 应用层协议: Web Protocols, 数据销毁, 文件和目录发现, 本机API, 混淆文件或信息: Encrypted/Encoded File, 磁盘擦除: Disk Structure Wipe, 磁盘擦除: Disk Content Wipe, 移除指标: File Deletion, 系统二进制代理执行: InstallUtil, 系统信息发现, 系统关机/重启, 系统服务: Service Execution, 网络共享发现, 网络服务, 虚拟化/沙盒规避: System Checks, 虚拟化/沙盒规避: Time Based Evasion, 访问令牌操控: Create Process with Token, 软件发现: Security Software Discovery, 输入工具传输, 进程注入: Process Hollowing, 预操作系统引导: Bootkit

References