22 March 2022

InvisiMole APT targets Ukrainian state orgs with phishing attacks


InvisiMole APT targets Ukrainian state orgs with phishing attacks

The Computer Emergency Response Team for Ukraine (CERT-UA) has issued a security alert warning of phishing attacks against government entities in Ukraine launched by InvisiMole (aka UAC-0035), a hacker group with ties to the Russia-linked advanced persistent threat (APT) group Gamaredon.

The malicious campaign involves phishing messages containing an attached archive named “501_25_103.zip.” When opened, it downloads and executes an HTML Application file (HTA), which, in turn, downloads and executes VBScript designed to deploy the LoadEdge backdoor. This tool is then used to download additional malicious programs, such as TunnelMole (DNS backdoor), and RC2FM and RC2C modules (both are backdoors acting as data collection and surveillance tools).

First spotted in 2018, InvisiMole is believed to have been active since at least 2013. In the past, the group was linked to attacks against high profile organizations in Eastern Europe, more specifically, in the military and diplomacy sectors. While InvisiMole appears to have ties with Gamaredon/Primitive Bear, security researchers believe that they are two distinct groups with different TTPs, rather than a single threat actor.

Cybersecurity Help’s statement on the critical situation in Ukraine

On February 24, people in many cities and towns across Ukraine woke up to the sounds of explosions and artillery fire, as the Russian Federation launched a full-scale invasion of the country. Such actions are unacceptable, political ambitions of any man aren’t worth of blood, tears, and destruction of millions of lives. We give our full support to the Ukrainian people in these hard times. No more war! Слава Україні!

Back to the list

Latest Posts

Cyber Security Week in Review: April 19, 2024

Cyber Security Week in Review: April 19, 2024

In brief: the LabHost PhaaS platform shut down, Russian military hackers attacked critical infrastructure in the US and Europe, and more.
19 April 2024
Ukrainian military personnel targeted via messaging apps and dating sites

Ukrainian military personnel targeted via messaging apps and dating sites

The threat actor employs a range of software in their malicious activities, including both commercial programs and  open-source tools.
18 April 2024
Russian military hackers targeted US water utilities and hydroelectric facilities in Europe

Russian military hackers targeted US water utilities and hydroelectric facilities in Europe

This marks the first time Russian nation-state hackers have posed a direct threat to critical infrastructure in Western countries.
18 April 2024