The Cloud CommunityThe Cloud Community
    Join Our Community
  • Cloud Clinics
  • Resource Centre
  • Technologies
      • Modern Cloud Platforms
      • Cloud assessment
      • Platform as a service
      • Managed Services
      • Technologies
      • IT transformation
      • Advanced Cloud Solutions
      • Advanced Workloads
      • Storage Optimisation
      • The business case for cloud
      • Connected Workplace
      • eSignatures
      • Call management
      • File Sharing
      • Storage
      • Collaboration Tools and Remote Workplace
      • Remote Working
      • DocuSign
      • Backup and security
      • Cloud Telephony
      • Call Recording
      • Direct Routing
      • Meeting Rooms
      • Call Centre
      • Seamless Security
      • Vulnerability Management
      • Network security
      • Identity and access management
      • Data protection
      • Mobile security
      • Hardware security
      • Cloud Security
      • Security Frameworks
      • Antivirus
      • Endpoint Protection
      • Remote Monitoring
      • Disaster Recovery
      • Password Protection
      • Business Performance
      • Customer Relationship Management
      • Cloud Management
      • Enterprise Resource Planning
      • Low code solutions
      • Shop B2B
      • Power Platform
      • AI and Copilot
      • Business Performance
      • Sustainability
  • In the News
  • Events

Prime Minister’s Office Compromised

Details of Recent Espionage Campaign

LEARN MORE
  • Home
  • Seamless security
  • Antivirus
  • Trellix
  • Prime Minister’s Office Compromised: Details of Recent Espionage Campaign
Here we bring you an article by Marc Elias, security researcher, originally published on January 25, 2022.

A special thanks to Christiaan Beek, Alexandre Mundo, Leandro Velasco and Max Kersten for malware analysis and support during this investigation.

Executive Summary

The Trellix Advanced Threat Research Team identified a multi-stage espionage campaign targeting high-ranking government officials overseeing national security policy and individuals in the defence industry in Western Asia. As they detail the technical components of this attack, they confirm that they’ve undertaken pre-release disclosure to the victims and provided all necessary content required to remove all known attack components from their environments.

Infection chain

The infection chain starts with the execution of an Excel downloader, most likely sent to the victim via email, which exploits an MSHTML remote code execution vulnerability (CVE-2021-40444) to execute a malicious executable in memory. The attack uses a follow-up piece of malware called Graphite because it uses Microsoft’s Graph API to leverage OneDrive as a command and control server—a technique our team has not seen before. Furthermore, the attack was split into multiple stages to stay as hidden as possible.

Command and control functions used an Empire server that was prepared in July 2021, and the actual campaign was active from October to November 2021. The below blog will explain the inner workings, victimology, infrastructure and timeline of the attack and, of course, reveal the IOCs and MITRE ATT&CK techniques.

A number of the attack indicators and apparent geopolitical objectives resemble those associated with the previously uncovered threat actor APT28. While we don’t believe in attributing any campaign solely based on such evidence, we have a moderate level of confidence that our assumption is accurate. That said, we are supremely confident that we are dealing with a very skilled actor based on how infrastructure, malware coding and operation were setup.

For more details of the Threat you can read the article in full on the Trellix website.

If you’d like more information about Trellix solutions and products, please get in touch and we’ll be happy to put you in touch with a specialist
Related Stories
All-in-one protection for users, data, and devices
Monday, July 10, 2023 | 2 MINS
All-in-one protection for users, data, and devices

Introducing McAfee Business Protection

Make cybersecurity less stressful with Trellix
Monday, January 02, 2023 | 3 MINS
Make cybersecurity less stressful with Trellix

Help SecOps relax with simpler security.

What are the latest cyber threats?
Monday, November 07, 2022 | 5 MINS
What are the latest cyber threats?

Key insights presented by Trellix Threat Labs.

Mission Possible
Monday, January 10, 2022 | 8 MINS
Mission Possible

Hunting Down and Stopping Stealthy Attackers

Rate the Article

Click the link below to rate this article

Rate this article
Have you seen...

Get all of the Azure migration tools and guidance you need to plan and implement your move to the cloud – and track your progress using a central dashboard that provides intelligent insights.

Watch Video
Related Articles
  1. All-in-one protection for your employees, data, and devices
  2. Make cybersecurity less stressful with Trellix
  3. What are the latest cyber threats?
  4. Mission Impossible
Rate this article

Let us know what you think about the article.

Choose what you want to see

Let us know what you’re interested in and the issues that matter to you.

If you’d like to know more about any of the technologies mentioned in this article please get in touch.
© 2025 The Cloud Community | Privacy Policy | Terms & Conditions