Threat IntelHIGH

Pro-Russian Hackers Target Ukraine via Phishing Campaign

Featured image for Pro-Russian Hackers Target Ukraine via Phishing Campaign
TRThe Record
UAC-0255CyberSerpAgeWheezeCERT-UAphishing
🎯

Basically, hackers pretended to be Ukraine's cybersecurity team to trick people into downloading malware.

Quick Summary

Pro-Russian hackers impersonated Ukraine's cyber agency in a phishing campaign targeting various sectors. This poses serious risks to government and businesses alike. Cybersecurity officials are investigating the incident.

The Threat

A pro-Russian hacker group, known as UAC-0255, has launched a phishing campaign targeting various sectors in Ukraine. This campaign involved impersonating Ukraine’s national cyber incident response team, CERT-UA. The attackers sent emails claiming to warn recipients about an impending cyberattack from Russia. These messages urged recipients to download a password-protected archive containing malicious software disguised as security tools.

The emails warned that ignoring the message could lead to "serious consequences," which is a common tactic used in phishing schemes to instill fear. By leveraging the credibility of a trusted agency, the hackers aimed to trick recipients into installing malware on their systems.

Who's Behind It

The group behind this operation is linked to CyberSerp, a relatively new threat actor that emerged in late 2025. They describe themselves as a "cyber-partisan movement" and claim Ukrainian origins. Their Telegram channel has been used to recruit collaborators and boast about their malicious activities. CyberSerp has previously claimed responsibility for other attacks, including a breach of the cybersecurity firm Cipher, highlighting their growing presence in the cyber threat landscape.

The attackers have also claimed to have sent malicious emails to about one million users of the Ukr.net email service, although CERT-UA has not confirmed these figures. The group's audacity is evident as they thanked CERT-UA for inadvertently promoting their Telegram channel through their investigation.

Tactics & Techniques

The phishing emails contained a remote administration tool called AgeWheeze, which allows attackers to gain control over infected computers. This tool can execute commands, manage files, and even stream screen content. Such capabilities make it a powerful weapon in the hands of cybercriminals.

CERT-UA reported that the campaign was largely unsuccessful, resulting in only a few infections, primarily on personal devices belonging to employees of educational institutions. However, the fact that the campaign targeted a wide range of organizations, including government institutions and financial companies, underscores the potential risk.

Defensive Measures

To protect against such phishing attempts, organizations should implement robust email filtering solutions and conduct regular cybersecurity training for employees. Awareness of the tactics used by threat actors is crucial. Users should be cautious about unsolicited emails, especially those that prompt downloads or ask for sensitive information.

Additionally, organizations should ensure that security patches are up-to-date and consider employing multi-factor authentication to add an extra layer of security. By staying vigilant and informed, organizations can better defend against these evolving threats.

🔒 Pro insight: The use of impersonation tactics highlights the need for enhanced verification processes within government communications to thwart similar phishing attempts.

Original article from

TRThe Record
Read Full Article

Related Pings

HIGHThreat Intel

NCSC Warns of Targeted Attacks on Messaging Apps

The NCSC has issued a warning about rising threats targeting messaging apps. High-risk users, like government officials, are particularly vulnerable. It's crucial to take proactive steps to safeguard sensitive information from these attacks.

NCSC UK·
HIGHThreat Intel

Stolen Logins - Fueling Ransomware and Geopolitical Attacks

Credential theft is fueling a surge in ransomware and geopolitical cyberattacks. Organizations must adapt to this evolving threat landscape by focusing on detecting the misuse of stolen logins.

SecurityWeek·
HIGHThreat Intel

Elastic Releases Detections for Axios Supply Chain Attack

Elastic Security Labs has released detection rules for a supply chain attack involving malicious Axios package versions. This compromise affects multiple platforms, posing risks to users. Immediate action is advised for those using affected versions.

Elastic Security Labs·
HIGHThreat Intel

TeamPCP Shifts Operations from OSS to AWS Environments

TeamPCP has shifted its focus to AWS environments, using stolen credentials to exfiltrate sensitive data. This poses significant risks to cloud security. Organizations must enhance their defenses against such threats.

SecurityWeek·
HIGHThreat Intel

Iran's Hackers Launch Offensive Cyber Attacks Against US, Israel

Iranian hackers are intensifying their cyber attacks against the US and Israel, aiming to disrupt and extract intelligence. This escalation raises concerns about the effectiveness of current defenses. Experts warn that if left unchecked, these attacks could lead to more significant consequences.

Ars Technica Security·
HIGHThreat Intel

Initial Access Brokers Target High-Value Organizations

Initial Access Brokers are now focusing on high-value targets and charging premium prices. This trend poses significant risks to sectors like Government and IT. Organizations need to enhance their defenses to combat these evolving threats.

Rapid7 Blog·