26 February 2024

Threat actor UAC-0149 targets Armed Forces of Ukraine with Cookbox backdoor


Threat actor UAC-0149 targets Armed Forces of Ukraine with Cookbox backdoor

The Government Response Team on Computer Security Incidents of Ukraine (CERT-UA) has warned of a targeted cyberattack aimed at infecting the computer systems used by the Armed Forces of Ukraine with the Cookbox backdoor.

According to CERT-UA, an unidentified individual distributed an XLS document named “1_ф_5.39-2024.xlsm” via the Signal messenger among several military personnel, claiming to have issues with report formation. The said file contained additional VBA script that triggered the download and execution of a PowerShell script named “mob2002.data.”

The PowerShell script downloaded from GitHub makes some changes in the OS registry. More specifically, it drops a base64-encoded payload in ‘HKEY_CURRENT_USER\SOFTWARE\Microsoft\XboxCache,’ which ultimately executes the Cookbox malware.

Cookbox is a PowerShell script that implements functionality for downloading and executing PowerShell cmdlets.

Dynamic DNS services (such as gotdns.ch, myftp.biz) and Cloudflare Workers are utilized for the operation of command and control servers.

The described activity, tracked as UAC-0149, has been ongoing since at least autumn 2023, CERT-UA said.

Last week, Recorded Future’s Insikt Group reported that the Russia-linked Winter Vivern cyberespionage group has been abusing an XSS vulnerability in the popular RoundCube webmail software in a cyberespionage campaign targeting government, military, and national infrastructure-related entities across Europe, including Ukraine, Poland and Georgia.

Additionally, security researchers at ESET uncovered a disinformation campaign aimed at Ukrainian speakers both within Ukraine and abroad. Dubbed “Operation Texonto,” the campaign employs a variety of tactics aimed at sowing seeds of doubt and spreading false information among the Ukrainian populace.


Back to the list

Latest Posts

Cyber Security Week in Review: July 26, 2024

Cyber Security Week in Review: July 26, 2024

In brief: A North Korean hacker indicted for ransomware attacks, French police dismantle the PlugX botnet, and more.
26 July 2024
Stargazer Goblin launch malware distribution-as-a-service via GitHub

Stargazer Goblin launch malware distribution-as-a-service via GitHub

The operation is using over 3,000 fake GitHub accounts.
25 July 2024
North Korean APT45 expanding into financially-motivated operations

North Korean APT45 expanding into financially-motivated operations

The threat actor has been observed targeting critical infrastructure more frequently than other North Korean hackers.
25 July 2024