22 May 2024

Hackers target orgs in Ukraine with SmokeLoader malware


Hackers target orgs in Ukraine with SmokeLoader malware

The Governmental Computer Emergency Response Team of Ukraine (CERT-UA) has reported a significant increase in activity from the financially motivated threat actor it tacks as UAC-0006. Since May 20, 2024, the threat actors have launched at least two distinct malware distribution campaigns, the team said.

According to CERT-UA, these campaigns involve the dissemination of the Smokeloader malware through phishing emails. The emails contain ZIP archives that house malicious files such as .IMG files containing executable (.exe) files and ACCDB documents (Microsoft Access) with embedded macros that execute PowerShell commands to download and run the exe files.

Once a system is initially compromised, additional malware such as Taleshot and RMS, among others, are subsequently downloaded and installed.

Currently, the botnet comprises several hundred infected computers. CERT-UA anticipates a resurgence in fraud schemes utilizing remote banking systems in the near future.


Back to the list

Latest Posts

Cyber Security Week in Review: June 14, 2024

Cyber Security Week in Review: June 14, 2024

In brief: Arm warns of actively exploited Mali GPU zero-day, Microsoft delays the release of its AI-powered Recall feature, and more.
14 June 2024
TellYouThePass ransomware weaponizes recently patched PHP flaw

TellYouThePass ransomware weaponizes recently patched PHP flaw

Imperva identified several campaigns exploiting the CVE-2024-4577 vulnerability.
13 June 2024
Ukraine neutralizes bot farms involved in hacking Ukrainian soldiers’ phones

Ukraine neutralizes bot farms involved in hacking Ukrainian soldiers’ phones

Additionally, the bot farm was used to spread Russian fake news.
13 June 2024