Sandworm reportedly uses SSH-over-Tor tunnels for long-term hidden access


Sandworm has reportedly used a combined SSH and Tor tunneling setup to keep hidden access inside victim networks for long periods. The campaign was detailed by 360 Advanced Threat Research Institute and later summarized in English-language security reporting.

The attack uses a spear-phishing ZIP file with a malicious Windows shortcut, a decoy document, and tools disguised as familiar applications. Once opened, the toolkit builds a layered remote access channel that can hide behind encryption and Tor routing.

The key point is not just that the attackers used Tor. The more serious issue is that they nested SSH inside Tor, then mapped local services such as SMB and RDP to a hidden .onion address. That gives the operator a way to reach the infected machine without exposing a normal inbound connection.

How the attack starts

The campaign begins with a spear-phishing email that carries a ZIP archive named Iskhod_7582_Predstavlenie_na_naznachenie.zip. The archive reportedly contains a malicious .lnk shortcut disguised as a PDF document and a fake $RECYCLE.BIN folder made to look like a normal Windows system folder.

When the victim opens the shortcut, the malware chain runs in the background while a decoy PDF opens on screen. This helps the attackers reduce suspicion because the user sees something that looks expected.

Attack flow (Source – 360)

The sample reporting lists the ZIP archive MD5 hash as 2156c270ffe8e4b23b67efed191b9737. Security teams can use that hash as a starting point, but they should not rely on it alone because attackers can easily change file hashes in future waves.

What the tunnel does and why it matters

The attack’s main purpose is long-term access. Researchers say the toolkit combines an OpenSSH daemon with Tor and obfs4 traffic obfuscation, which helps the traffic blend into random-looking TCP streams.

The SSH service listens only on the local loopback address, reportedly on port 20321. That design makes the SSH server harder to spot from outside the machine because it does not behave like a normal exposed remote service.

The Tor component then creates a hidden service and generates an .onion hostname. The script sends victim identity details to a hardcoded Tor command-and-control address, allowing the attacker to reconnect through the Tor network.

ItemWhat current reporting shows
Threat groupSandworm, also tracked as APT-C-13 and FROZENBARENTS
Reported techniqueSSH nested inside Tor
Initial accessSpear-phishing ZIP with malicious .lnk shortcut
Decoy methodFake PDF shown while payloads install
Persistence methodHidden scheduled tasks
Local services exposedSMB port 445 and RDP port 3389
Main riskStealthy remote control through a Tor hidden service

How Sandworm hid the tools

The malware uses names that look like normal software. The reports say operagx.exe is actually an OpenSSH daemon, while dropbox.exe is a Tor server. A third file, safari.exe, works as an obfs4 plugin, and obsstudio.exe acts as an SFTP server for file transfers.

Scheduled Task (Source – 360)

This naming strategy matters because security teams often see many legitimate browser, cloud storage, and media application files across business networks. Attackers can use that noise to hide malicious binaries in user directories or less monitored paths.

The main script also checks whether it is running on a real machine before continuing. It reportedly looks for at least 10 recent .lnk files and 50 or more running processes, which can help the malware avoid basic sandbox analysis.

What is confirmed and what is still unclear

What is confirmed is that 360’s public security news page lists a report on suspected APT-C-13, or Sandworm, using SSH and Tor tunnels for covert persistence. The page describes the group as a state-backed APT focused on long-term cyber espionage against government, diplomatic, energy, and research targets.

MITRE tracks Sandworm Team separately as group G0034 and says the group has been active since at least 2009. MITRE also links Sandworm to GRU Unit 74455 and lists major past operations, including attacks against Ukrainian electrical companies, NotPetya, Olympic Destroyer, and other campaigns.

What remains less clear from the available public reporting is the full victim list, the number of affected organizations, and whether the same tooling has been deployed in multiple regions. The public summaries focus mainly on the attack chain and tradecraft rather than campaign scale.

Why defenders may care

This tradecraft matters because it abuses tools and services that can look legitimate in the right context. SSH, Tor, scheduled tasks, SFTP, RDP, and SMB all have normal uses, but the combination creates a hidden remote access path that standard perimeter checks may miss.

The use of Tor also reduces the value of simple IP-based blocking. Defenders need endpoint visibility, scheduled task auditing, command-line monitoring, and unusual process path detection to catch this kind of setup.

MITRE’s ATT&CK guidance notes that adversaries can use SSH for remote access after they obtain valid access, and it also documents how attackers use common application-layer protocols to blend command traffic with normal network activity.

At a glance

AreaDetails
Delivery fileIskhod_7582_Predstavlenie_na_naznachenie.zip
Malicious triggerDisguised .lnk shortcut
Fake folder$RECYCLE.BIN
Main scriptcurrentSessionTrigger
Scheduled tasksOperagxRepairTask, DropboxRepairTask
SSH disguiseoperagx.exe
Tor disguisedropbox.exe
Obfuscation pluginsafari.exe
SFTP componentobsstudio.exe
Local SSH port20321
Mapped servicesSMB 445 and RDP 3389

What security teams can do now

  • Audit scheduled tasks for names that imitate browsers, cloud storage apps, or common desktop software.
  • Look for OpenSSH, Tor, SFTP, or obfs4-like binaries running from unusual user-writable locations.
  • Hunt for SSH daemons bound to loopback addresses on non-standard ports.
  • Check for unexpected RDP and SMB exposure through local tunnels.
  • Review outbound Tor and obfs4 traffic patterns, especially from endpoints that should not use anonymity networks.
  • Block or quarantine ZIP attachments that contain .lnk files disguised as documents.
  • Train users to avoid opening shortcuts inside archives, even when the file icon looks like a PDF.
  • Monitor curl commands that repeatedly contact .onion infrastructure through Tor.

FAQ

What is Sandworm?

Sandworm is a Russian state-linked threat group tracked by several names, including APT-C-13, FROZENBARENTS, APT44, and Seashell Blizzard. MITRE tracks Sandworm Team as G0034 and links it to GRU Unit 74455.

What is SSH-over-Tor?

SSH-over-Tor means the attacker routes SSH remote access through the Tor network. In this campaign, the approach reportedly creates a hidden encrypted channel between the compromised machine and the attacker.

Does this attack require the victim to run a file?

Yes. Current reporting says the infection starts when a victim opens a malicious .lnk shortcut inside a ZIP archive. A decoy PDF opens to make the action look normal.

Why are SMB and RDP important in this campaign?

SMB and RDP are powerful Windows services. If attackers map them through a hidden tunnel, they may access files, move laterally, or operate the machine remotely without opening normal inbound firewall paths.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages