Cyber adversaries have recently escalated their offensive against Ukrainian defense companies by dispatching deceptive emails that masquerade as contracts for drone acquisitions. This information comes from a notice issued by the nation’s cybersecurity authority.
The deceptive emails were embedded with a zip file and a PDF that, once accessed, unleashed harmful software, specifically two strains known as Glueegg and Dropclue, onto the recipients’ computer systems.
These malicious tools enabled the perpetrators to clandestinely install a seemingly benign remote management software named Atera onto the compromised systems.
The cyber watchdog of Ukraine, identified as CERT-UA, is actively monitoring the threat actors, designated as UAC-0180. While the agency has not pinpointed the origin of these cyber intrusions, it has highlighted the persistent attempts to breach the digital defenses of Ukrainian defense sector employees.
CERT-UA’s statement, released on a recent Thursday, emphasized the group’s relentless efforts to infiltrate a diverse array of targets without ceasing their unauthorized cyber activities.
The attackers have been deploying a variety of digital weapons, including Acrobait, Rosebloom, Rosethorn, Glueegg, and Dropclue, continually refining their arsenal, according to the cybersecurity team.
Ukrainian defense forces and related industries have frequently found themselves in the crosshairs of cyberattacks, often traced back to Russian affiliations. A notable incident in June involved a malicious entity known as Vermin deploying Spectr malware against Ukrainian military forces to exfiltrate sensitive data.
Concurrently, security analysts have raised alarms about incursions targeting Ukraine’s Defence Ministry, orchestrated by a Belarusian hacker collective dubbed Ghostwriter.
Furthermore, CERT-UA has previously issued alerts regarding cyber offensives leveraging DarkCrystal malware against Ukrainian military and defense entities, potentially granting remote access to the infiltrators.
