Sandworm-linked hackers reportedly pivot to stealthy RDP persistence in new Ukraine-focused campaign


A new report claims a Sandworm-linked campaign is using fake Microsoft Office ISO files to compromise targets in Ukraine, then planting tools that keep Remote Desktop Protocol access alive for long periods. If the findings hold, the operation shows a familiar Russian state-backed actor leaning even harder into quiet persistence and intelligence gathering instead of fast disruption.

The sample report says the operation centers on a disguised ISO file named Microsoft.Office.2025×64.v2025.iso, distributed through Telegram channels and software-cracking communities. Once opened, the image allegedly launches hidden executables and deploys a modular toolset that includes Tambur, Sumbur, Kalambur, and DemiMur for persistence, tunneling, and trust abuse. I could confirm broad Sandworm tradecraft around long-term access and edge-system targeting from Microsoft, Amazon, MITRE, and Mandiant-linked reporting, but I could not independently verify every campaign-specific detail from the original Chinese-language research through a primary source available on the open web.

That distinction matters. Sandworm, also tracked as APT44 and Seashell Blizzard, has a long record of destructive attacks, espionage, and sustained access operations. Microsoft said in February 2025 that a Seashell Blizzard subgroup called BadPilot had conducted a multiyear global access operation against internet-facing infrastructure to maintain persistent access to high-value targets. Amazon Threat Intelligence later warned that Sandworm-linked activity was also targeting Western critical infrastructure, with defenders urged to secure network edge devices and monitor for credential replay and persistence behavior.

So while the exact malware family names in this new report need fuller public verification, the larger story fits known Sandworm behavior. The actor has repeatedly targeted Ukraine, government bodies, critical infrastructure, and remote access pathways, and it has a documented history of using SSH-based persistence and tunneling. MITRE’s Sandworm entry notes the group has used Dropbear SSH with a hardcoded backdoor password to maintain persistence inside victim networks, which aligns with the broader pattern described in the sample.

What the new report claims

The attackers lure victims with a fake Office ISO, then silently launch payloads disguised as auto.exe or setup.exe. The framework allegedly creates scheduled tasks under a Windows-looking path, uses a hardcoded password to keep RDP access alive, tunnels command traffic through Tor, and maps port 3389 back to remote infrastructure through SSH reverse tunneling. The report also says a module called DemiMur injects a rogue root certificate and forces Microsoft Defender exclusions across the system drive.

If accurate, that combination gives attackers three advantages at once. It helps them blend into normal admin activity, preserve remote access even after reboots, and reduce the chance that basic antivirus tools will catch the intrusion early. That tradecraft also matches MITRE ATT&CK techniques tied to Sandworm and other advanced groups, especially abuse of external remote services for access and persistence.

APT-C-13 Attack Chain (Source – Weixin)

Why defenders should pay attention

This campaign matters even if some technical details still need stronger primary confirmation. Sandworm is not a fringe actor. Google Threat Intelligence says APT44, its name for Sandworm, operates across espionage, attack, and influence operations and has become one of the most capable state-backed threat groups active today. Microsoft and Amazon have both described related operations that focus on durable access, stealth, and infrastructure-level compromise rather than one-off smash-and-grab activity.

The likely lesson for defenders is simple. Watch the remote access layer, not just endpoint malware alerts. A patient actor with RDP, SSH, scheduled tasks, and outbound tunnels can stay inside a network for months, especially when the tools mimic legitimate software paths and admin behavior. That risk rises further in environments where software cracking, sideloaded installers, or unauthorized ISO images slip past user controls.

DemiMur Certificate Injection (Source – Weixin)

Quick breakdown

AreaReported behaviorWhy it matters
Initial lureFake Microsoft Office ISO shared through Telegram and crack communitiesTurns user trust into initial access
PersistenceScheduled tasks and long-lived RDP accessKeeps foothold after reboot or cleanup
Remote controlSSH reverse tunneling and Tor routingHides operator location and traffic paths
Defense evasionFake trusted certificate and Defender exclusionsLowers visibility for security tools
Strategic goalQuiet espionage over timeSupports long-term intelligence collection

Sources for campaign specifics: sample text provided by user. Broader Sandworm context: Microsoft, Amazon, MITRE, Google Threat Intelligence.

What security teams should do now

  • Block unauthorized ISO files, crack tools, and unofficial software activators at email, web, and endpoint layers.
  • Audit scheduled task creation, especially tasks placed in Windows-like paths that mimic legitimate components.
  • Hunt for unusual RDP exposure, new admin-level scheduled tasks, PowerShell abuse, reverse tunnels, and outbound Tor-related traffic.
  • Review certificate stores and Microsoft Defender exclusion lists for unauthorized changes.
  • Harden internet-facing systems and remote access services, since Microsoft and Amazon both say Sandworm-linked operators have focused on persistent access through exposed infrastructure.

FAQ

Is this definitely Sandworm?

The sample attributes the campaign to APT-C-13 and links it to Sandworm, APT44, and Seashell Blizzard. I confirmed that those names are widely associated with the same broader Russian state-backed ecosystem, but I could not independently validate every campaign-specific detail from a primary public source.

What makes this campaign different from older Sandworm attacks?

The sample frames it as a shift from overt disruption to quieter, longer-term persistence. That direction matches Microsoft’s description of Seashell Blizzard’s multiyear access operations, even though Sandworm still retains destructive capabilities.

Why is RDP central here?

RDP gives attackers interactive access to compromised systems and works well with persistence mechanisms, tunnels, and credential abuse. MITRE also notes that external remote services commonly support both initial access and long-term access.

What should organizations check first?

Start with remote access exposure, scheduled tasks, PowerShell execution, SSH tunnels, suspicious certificates, and endpoint policy changes such as broad Defender exclusions.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages