Buhtrap, Ratopak Spider

Description

(Group-IB) Buhtrap has been active since 2014, however their first attacks against financial institutions were only detected in August 2015. Earlier, the group had only focused on targeting banking clients. At the moment, the group is known to target Russian and Ukrainian banks.

From August 2015 to February 2016 Buhtrap managed to conduct 13 successful attacks against Russian banks for a total amount of 1.8 billion rubles ($25.7 mln). The number of successful attacks against Ukrainian banks has not been identified.

Buhtrap is the first hacker group using a network worm to infect the overall bank infrastructure that significantly increases the difficulty of removing all malicious functions from the network. As a result, banks have to shut down the whole infrastructure which provokes delay in servicing customers and additional losses.

Malicious programs intentionally scan for machines with an automated Bank-Customer system of the Central Bank of Russia (further referred to as BCS CBR). We have not identified incidents of attacks involving online money transfer systems, ATM machines or payment gates which are known to be of interest for other criminal groups.

Buhtrap has some infrastructure overlap with TA505, Graceful Spider, Gold Evergreen.

Names

NameName-Giver
BuhtrapGroup-IB
Ratopak SpiderCrowdStrike
UAC-0008CERT-UA

Country

Motivation

  • Financial crime

First Seen

2015

Observed Sectors

Observed Countries

Tools

Operations

Information

Other Information

Uuid

30df5485-c9bd-4d36-a685-4f202162e323

Last Card Change

2022-04-08