UAC-0200 cyber spies target Ukraine’s defense industry with DarkCrystal RAT

UAC-0200 cyber spies target Ukraine’s defense industry with DarkCrystal RAT

The Ukrainian government’s Computer Emergency Response Team (CERT-UA) has observed an increasing number of targeted cyberattacks aimed at employees within the defense-industrial complex and select representatives of the Ukrainian Armed Forces. The attacks, which have been ongoing, have been detected across several different platforms, including the popular messaging application Signal.

Throughout March 2025, CERT-UA detected malicious messages distributed on Signal, containing archived files purportedly related to meeting summaries. In some cases, these messages were sent from compromised accounts of known contacts to increase the trustworthiness of the communications.

The archives typically contain a file with a ".pdf" extension and an executable file identified as DarkTortilla. The tool is classified as a cryptor/loader, which is designed to decrypt and execute remote access tools (RATs), particularly the DarkCrystal RAT (DCRAT). The tool is commonly used by cybercriminals to gain remote control over infected systems, allowing attackers to gather sensitive data and potentially disrupt operations.

This particular cyber activity has been tracked under the identifier UAC-0200 since at least the summer of 2024. However, beginning in February 2025, the content of these phishing messages has shifted to focus on topics such as drones (UAVs), electronic warfare (EW) systems, and other sensitive military technologies.


Back to the list

Latest Posts

Cyber Security Week in Review: April 25, 2025

Cyber Security Week in Review: April 25, 2025

In brief: A SAP NetWeaver zero-day bug exploited in the wild, DslogdRAT exploits a recent Ivanti flaw, and more.
25 April 2025
ToyMaker: Financially-motivated IAB that sells access to ransomware gangs

ToyMaker: Financially-motivated IAB that sells access to ransomware gangs

ToyMaker is believed to be behind the custom backdoor dubbed ‘LAGTOY.’
24 April 2025
DragonForce and Anubis ransomware ops use novel models to attract affiliates and boost profits

DragonForce and Anubis ransomware ops use novel models to attract affiliates and boost profits

DragonForce introduced a distributed affiliate branding model.
23 April 2025