Malware & RansomwareHIGH

Malware - Hackers Clone CERT-UA Site to Install RAT

Featured image for Malware - Hackers Clone CERT-UA Site to Install RAT
CSCyber Security News
AGEWHEEZEUAC-0255CERT-UAremote access trojanphishing
🎯

Basically, hackers created a fake government website to trick people into downloading dangerous software.

Quick Summary

Hackers have cloned Ukraine's CERT-UA site to distribute a dangerous RAT. Government and medical staff were targeted, raising serious security concerns. Quick action by CERT-UA helped contain the threat.

What Happened

A threat group recently executed a sophisticated attack by cloning Ukraine's official cybersecurity authority website, CERT-UA. This operation aimed to deceive targets into downloading a remote access tool (RAT) known as AGEWHEEZE. The campaign, tracked as UAC-0255, utilized a combination of phishing emails and a counterfeit website to distribute malware.

The attack unfolded on March 26 and 27, 2026, when various organizations received emails appearing to be from CERT-UA. These messages urged recipients to download a password-protected archive named "CERT_UA_protection_tool.zip" or "protection_tool.zip", claiming it contained a crucial security tool.

Who's Affected

The phishing campaign targeted a wide array of sectors, including:

  • Government agencies
  • Medical centers
  • Security firms
  • Educational institutions
  • Financial organizations
  • Software development companies

Despite the extensive reach, CERT-UA confirmed that the attack did not spread widely. Only a few personal devices belonging to staff at educational institutions were found to be infected.

What Data Was Exposed

The malicious executable hidden within the downloaded archive was AGEWHEEZE, a fully functional RAT developed using the Go programming language. Once installed, it could capture screenshots, simulate user inputs, manage files, and control system services, posing a severe risk to sensitive information.

How AGEWHEEZE Installs Itself and Stays Hidden

Upon execution, AGEWHEEZE installs itself in the AppData folder, using paths like %APPDATA%\SysSvc\SysSvc.exe. It establishes persistence through registry entries and scheduled tasks, ensuring it remains active even after system reboots. The malware connects to its command-and-control (C2) server using WebSockets for real-time communication.

Tactics & Techniques

The attackers registered a domain, cert-ua[.]tech, and created a fake website mimicking the official CERT-UA site. The fraudulent site was equipped with download links and installation instructions. Investigators discovered a hidden message in the site's HTML, indicating the group's identity, and they quickly took down the site after its brief operation.

Defensive Measures

Organizations are urged to implement application control tools like SRP or AppLocker to prevent unauthorized software from running. Additionally, reducing the attack surface at the network perimeter and on individual devices is crucial. Employees should be cautious of unexpected emails, especially those claiming to be from trusted authorities.

Conclusion

This incident underscores the need for heightened vigilance against phishing attacks and the importance of verifying the authenticity of software downloads, particularly from government or cybersecurity organizations.

🔒 Pro insight: The use of a cloned government site highlights the evolving tactics of threat actors in targeting critical infrastructure.

Original article from

CSCyber Security News· Tushar Subhra Dutta
Read Full Article

Related Pings

HIGHMalware & Ransomware

CrystalRAT - New Malware-as-a-Service Offers Remote Access

A new malware-as-a-service called CrystalRAT has emerged, offering remote access and prank features. It targets popular applications and browsers, posing significant risks to users. Cybersecurity experts warn of its potential for widespread exploitation.

SC Media·
HIGHMalware & Ransomware

NoVoice Android Malware - Steals WhatsApp Data via Apps

NoVoice malware has infiltrated Google Play, stealing WhatsApp data from millions. Users are at risk of account cloning. Immediate action is necessary to secure devices.

SC Media·
HIGHMalware & Ransomware

WhatsApp Alerts Users About Spyware in Fake iPhone App

WhatsApp warns of a fake iPhone app containing spyware affecting around 200 users. The company is taking action against the creators and urges users to uninstall the malicious app immediately.

SC Media·
HIGHMalware & Ransomware

Ransomware Attackers Exploit Legitimate IT Tools to Bypass Antivirus

Ransomware attackers are using legitimate IT tools to bypass antivirus systems. This trend poses a significant risk to organizations, making detection difficult. Staying informed and proactive is crucial for defense.

SC Media·
HIGHMalware & Ransomware

Phishing Campaign - Delivers Casbaneiro and Horabot Trojans

A new phishing campaign is targeting Spanish-speaking users, delivering the Casbaneiro and Horabot banking trojans. This sophisticated attack poses serious risks, as it exploits various methods to trick victims. Stay alert and protect your sensitive information.

SC Media·
HIGHMalware & Ransomware

WhatsApp Alerts Users After Fake iOS App Installs Spyware

WhatsApp has alerted users about a fake iOS app that installed spyware on their devices. Most affected users are in Italy. This incident highlights the growing threat of social engineering tactics in cyber attacks.

The Hacker News·