Domestic Intelligence Service of the Federal Republic of Germany Warns About Cyber Attacks

What’s happened?

The German Intelligence service published information about sophisticated cyber attacks against both German media companies as well as organizations involved in chemical weapons research. There are indications that the attacks are linked to the APT group SAND-WORM and in the report Kaspersky references that there are technical overlaps to the cyber attack campaign, Olympic Destroyer, seen at the Olympic Winter Games in South Korea earlier this year. The German Intelligence Service states that the group is also known for Quedagh and BlackEnergy; has been active since 2013 conducting cyber espionage activities against NATO, western European government authorities, telco providers and academic institutions.

What do the attacks look like?

The attacks are German-written spear phishing attacks with malicious attachments. When the victim opens the attachment and allows the execution of makro’s, a visual basic script is executed. This script disables powershell logging, then executes powershell commands and downloads additional malicious code. By the end of this process, the attacker has access to execute any powershell command on the victim’s system. With access to execute powershell commands, and with the right user privileges such as ‘admin’, it’s like the attacker is sitting in front of the infected system with the ability to do anything and everything. The first attacks were seen back in August 2017 and may still be active, as organizations who were affected still may not know.

Where can I learn more?

This Cyber Brief from the German agency contains background information, recommendations of actions, indicators of compromise and contact details for organizations to reach out to if they have been affected.

The APT Report from Kaspersky with an update on the Olympic Destroyer includes details on what the mail attachments look like, details about the URL paths used on the command and control server, as well as payload analysis.

There are also details about the execution of the attachment ‘E-mail-Adressliste_2018.doc’ in Joe’s Sandbox Cloud.

How do I identify if I have been affected?

You will have to look back to August 2017. However, based on the report it seems this date has been specified as when it was first uploaded by someone to VirusTotal, rather than someone reporting it from their own environment. So, ideally we’d recommend going back as far as you can. You should review all the indicators of compromise highlighted by both Kaspersky Labs and the German Intelligence reports and validate.

IP Addresses:

Domains:

E-Mail attachments and file hashes:

Relying on the indicators of compromise for your detection capabilities going forward is no longer enough. Changing file names, file hashes, IP’s or domains is just too easy for attackers. However, it’s harder for attackers to change their tactics, so you might want to look into our Security Essentials and Splunk’s Enterprise Security Content Update for ways in which to force them to do so. These materials contain analytical concepts with explanations on what to look for in the early stages, what to baseline, and how to detect anomalies early. Many powershell examples are included as well as some nice sysmon examples.

What should I do if I have found an infected system?

If you have found a positive match, identify which machine it was. If you are using dynamic IPs you should look into your DHCP logs alongside your communication logs to identify which MAC-Address contained that source IP address, and historically where that communication was seen. From here, you can review your active directory logs to identify which users have logged on to those machines overtime. Reset their passwords and further identify the departments they work in to better understand what access was possible to sensitive data. Ideally for this you will have the log data of your business applications and file servers ready. Check for additional external communication to see if data was exfiltrated, and if so, how much. Once you have painted this bigger picture, you should inform your management as soon as possible for them to inform the German authorities about the incident and plan next steps.

If you have everything stored in text files, do not have Splunk, and the above process is looking painful to crawl through, then try Splunk Enterprise 60 days for free. Just install on your syslog server, point towards the directory, and wait until Splunk has indexed all your historical data.

All the best,

Matthias

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.