18 April 2024

Ukrainian military personnel targeted via messaging apps and dating sites


Ukrainian military personnel targeted via messaging apps and dating sites

The Ukrainian CERT-UA (Computer Emergency Response Team) has identified a surge in activity from a threat actor it tracks as UAC-0184 involving attacks targeting Ukrainian military with malware delivered through popular messaging apps and dating sites.

The attacks typically involve social engineering techniques, such as enticing messages with themes like opening executive proceedings or criminal cases, videos of combat actions, or requests for acquaintance via popular platforms.

The perpetrators start communicating with military personnel, eventually sending them a file (archive) asking to help open or process it.

The threat actor employs a range of software in their malicious activities, including both commercial programs and open-source tools, including IDAT (HijackLoader, Shadowladder, Ghostpulse), RemcosRAT, Viottokeyloager, Xworm, Sigtop, and Tusc.

The UAC-0184 group is known for its targeting members of the Ukrainian Armed Forces in an attempt to gain access to their computers and steal sensitive documents and data from messaging apps.

In January, the threat actor was observed using phishing lures linked to themes of war and military operations to deploy the RemcosRAT and ReverSessh malware.


Back to the list

Latest Posts

Cyber Security Week in Review: August 30, 2024

Cyber Security Week in Review: August 30, 2024

Google addresses yet another Chrome zero-day, Russian hackers caught using commercial spyware to compromise victims, and more.
30 August 2024
US offers $2.5M reward for information on hacker linked to Angler exploit kit

US offers $2.5M reward for information on hacker linked to Angler exploit kit

Volodymyr Kadariya is believed to be a key player in a major international hacking operation.
29 August 2024
South Korean cyber espionage group exploits zero-day in WPS Office to install SpyGlace backdoor

South Korean cyber espionage group exploits zero-day in WPS Office to install SpyGlace backdoor

The vulnerability, tracked as CVE-2024-7262, has been exploited since at least February 2024.
29 August 2024