Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 17, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 17, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 17, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 17, 2025

      Microsoft’s allegiance isn’t to OpenAI’s pricey models — Satya Nadella’s focus is selling any AI customers want for maximum profits

      May 17, 2025

      If you think you can do better than Xbox or PlayStation in the Console Wars, you may just want to try out this card game

      May 17, 2025

      Surviving a 10 year stint in dev hell, this retro-styled hack n’ slash has finally arrived on Xbox

      May 17, 2025

      Save $400 on the best Samsung TVs, laptops, tablets, and more when you sign up for Verizon 5G Home or Home Internet

      May 17, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      NodeSource N|Solid Runtime Release – May 2025: Performance, Stability & the Final Update for v18

      May 17, 2025
      Recent

      NodeSource N|Solid Runtime Release – May 2025: Performance, Stability & the Final Update for v18

      May 17, 2025

      Big Changes at Meteor Software: Our Next Chapter

      May 17, 2025

      Apps in Generative AI – Transforming the Digital Experience

      May 17, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft’s allegiance isn’t to OpenAI’s pricey models — Satya Nadella’s focus is selling any AI customers want for maximum profits

      May 17, 2025
      Recent

      Microsoft’s allegiance isn’t to OpenAI’s pricey models — Satya Nadella’s focus is selling any AI customers want for maximum profits

      May 17, 2025

      If you think you can do better than Xbox or PlayStation in the Console Wars, you may just want to try out this card game

      May 17, 2025

      Surviving a 10 year stint in dev hell, this retro-styled hack n’ slash has finally arrived on Xbox

      May 17, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Ukrainian Government Agencies Hit by Stealthy MeshAgent Malware Campaign

    Ukrainian Government Agencies Hit by Stealthy MeshAgent Malware Campaign

    August 13, 2024

    Over 100 Ukrainian state and local government computers have been compromised with MeshAgent malware in a phishing campaign leveraging trust in the Security Service of Ukraine (SBU).

    The attack detected by the Computer Emergency Response Team of Ukraine (CERT-UA) on Monday, involved emails seemingly originating from the SBU. These emails contained a link to download a file named “Documents.zip.”

    Clicking the link downloaded a Microsoft Software Installer (MSI) file instead. For example: “Scan_docs#40562153.msi“. Opening this MSI file unleashed the ANONVNC – also known as MeshAgent malware. This malware gave attackers potential covert, unauthorized access to infected machines, the CERT-UA said.

    “As of 12:00 on August 12, 2024, CERT-UA identified more than 100 affected computers, including those operating within state bodies and local self-government bodies of Ukraine.” – CERT-UA

    ANONVNC aka MeshaAgent Malware Attack Chain (Source: CERT-UA)

    Malware with Familiar Traits

    The ANONVNC malware, based on the source code observed by CERT-UA researchers, used a configuration file strikingly similar to the MeshAgent software tool.

    MeshAgent is typically a remote management tool that works with the open-source platform MeshCentral. It is compatible with Windows, Linux, macOS, and FreeBSD. Although it is not designed to be malicious, threat actors exploit this tool to establish backdoors on endpoints, allowing remote access through programs like VNC, RDP, or SSH.

    Recently, security researchers at Wazuh noted a rise in the misuse of MeshAgent by attackers to maintain persistence on compromised systems and issue remote commands.

    Why Threat Actors Use MeshAgent as Malware

    Seamless Connection: Once installed, MeshCentral requires no user intervention to connect with endpoints.
    Unauthorized Access: MeshCentral can access MeshAgent directly or via RDP without the endpoint’s consent.
    System Control: It can wake, restart, or power off endpoints.
    Command and Control: MeshCentral acts as a command server, executing shell commands and transferring files on the endpoint without the user’s knowledge.
    Undetectable Operations: Actions initiated by MeshCentral run under the NT AUTHORITYSYSTEM account, blending in with routine background tasks.
    Unique File Hashes: Each MeshAgent instance is uniquely generated, making detection by file hash challenging.

    Attackers often deploy MeshAgent through phishing emails. Its communication over standard ports like 80 and 443 increases the likelihood of bypassing firewalls.

    On a Windows endpoint, MeshAgent typically:

    Launches the MeshCentral background service.
    Connects to the MeshCentral server.
    Establishes a communication channel via pipes.
    Installs using the -fullinstall command flag.
    Places its executable at C:Program FilesMesh AgentMeshAgent.exe.
    Creates a registry key at HKLMSystemCurrentControlSetServicesMesh Agent for configuration storage.
    Adds another registry key at HKLMSystemCurrentControlSetControlSafeBootNetworkMeshAgent, enabling network access during Safe Mode.
    Modifies Windows services to achieve persistence, including creating a registry key to allow WebRTC traffic through the firewall.
    Executes most actions using the highly privileged NT AUTHORITYSYSTEM and LocalService accounts.

    When reconnecting to MeshCentral, MeshAgent:

    Reestablishes the communication channel.
    Creates a registry key at HKLMSOFTWAREMicrosoftWindows NTCurrentVersionScheduleTaskCacheTreeMeshUserTask for scheduling tasks like wake, sleep, and command execution.

    If MeshCentral reconnects without permission, it changes the connection manager service from “demand start” to “auto start.”

    MeshAgent’s source code is publicly available on Github, suggesting potential code reuse for the latest campaign. Due to this code similarity, CERT-UA has temporarily named the discovered malware ANONVNC.

    Wider Campaign Suspected

    The latest campaign is believed to have begun in July 2024 and may extend beyond Ukraine’s borders, according to CERT-UA’s researchers. Analysis of the pCloud file storage service revealed over a thousand EXE and MSI files uploaded since August 1, with some potentially linked to this broader campaign.

    Ukraine sprung a surprise attack on Russia in the Kursk region on Aug. 6 and today for the first time a top military commander publicly stated that Kyiv’s forces now controlled over 1,000 square kilometers (approximately 386 square miles) of Russian territiory.

    “The troops are fulfilling their tasks. Fighting continues actually along the entire front line. The situation is under our control,” Gen. Oleksandr Syrskyi said.

    The timing of the phishing campaign on Monday that deployed a backdoor malware on government computer systems follows this intense Ukrainian offensive but Kyiv did not name Russia or the Kremlin’s cyber army up front for these targeted attacks. Instead it tracked the campaign to a threat actor it tracks as UAC-0198.

    Russian hackers were previously found using similar tactics where they used legitimate remote monitoring and management software to spy on Ukraine and its allies. The malicious scripts required for downloading and running the RMM program on the victims’ computers were hidden among the legitimate Python code of the “Minesweeper” game from Microsoft.

    CERT-UA has promptly implemented measures to mitigate the latest cyber threat. Specific details regarding these measures were not disclosed.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleBREAKING: International Effort Dismantles ‘Radar/Dispossessor’ Ransomware Group
    Next Article APT28 Targets Diplomats with HeadLace Malware via Car Sale Phishing Lure

    Related Posts

    Development

    February 2025 Baseline monthly digest

    May 17, 2025
    Development

    Learn A1 Level Spanish

    May 17, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    CSS font-size-adjust is now in Baseline

    Development

    Monitor not paper-y enough? A 25-inch color E Ink monitor just dropped for *checks notes* $1,900

    News & Updates

    Defending Your Commits From Known CVEs With GitGuardian SCA And Git Hooks

    Development

    NewGenLib – metadata content management software

    Linux

    Highlights

    JavaScript API Calls – Guide

    April 21, 2025

    Comments Source: Read More 

    How WordPress Agencies Can Improve Site Building Efficiency

    May 6, 2025

    Florence-2, Microsoft Azure AI’s new model, is well-made for vision tasks

    June 24, 2024

    12 Best Free and Open Source Food and Drink Software

    May 8, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.