Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

How to watch Apple’s WWDC 2025 Keynote

In WWDC 25, AI must compensate with developers after AI shortage and lawsuits

New supply chain malware operations hit the NPM and PYPI ecosystems, targeting millions around the world

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » UAC-0226 deploys GiftedCrook Stealer via malicious Excel files targeted in Ukraine
Identity

UAC-0226 deploys GiftedCrook Stealer via malicious Excel files targeted in Ukraine

userBy userApril 8, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Malicious Excel files targeting Ukraine

The Ukrainian Computer Emergency Response Team (CERT-UA) has revealed a new set of cyberattacks targeting Ukrainian agencies using information-stealing malware.

The activity aims to military formations, law enforcement agencies and local autonomous organizations, particularly local autonomous organizations located near the eastern border of Ukraine.

The attack involves distributing phishing emails with macro-enabled Microsoft Excel spreadsheets (XLSM). This decorates the PowerShell script (“PowerShell script with 100% AV bypass”) taken from the PSSW100AVB when opening the two malwell deployments when opening the Github Option Option a reverses a sted a sted a sted a sted a sted a sted a sted a sthed swres.

“There are related and sensitive issues, including reference to file names and email subjects, related fines, administrative fines, production of UAVs, and compensation for destroyed property,” Cert-UA said.

Cybersecurity

“These spreadsheets contain malicious code that automatically converts to malware when you open a document and enable macros, and runs without the knowledge of the user.”

GiftedCrook written in C/C++ promotes theft of sensitive data from web browsers such as Google Chrome, Microsoft Edge, and Mozilla Firefox, including cookies, browsing history, and authentication data.

Email messages are often sent from compromised accounts through the email client’s web interface, lending a veneer of legitimacy to the message, ensuring future victims open the document. CERT-UA is not linked to a particular country but attributes activity to threat cluster UAC-0226.

Malicious Excel files targeting Ukraine

The development is because the actor, known as UNC5837, suspected of espionage between the Russian and Nexus, was linked to a phishing campaign in October 2024 targeting European governments and military organizations.

“The campaign is to adopt a signed .RDP file attachment to establish a Remote Desktop Protocol (RDP) connection from the victim’s machine,” says Google Threat Intelligence Group (GTIG).

“Unlike the typical RDP attacks focusing on interactive sessions, this campaign creatively leveraged resource redirection (mapping victim file systems to attacker servers) and remote up (presenting attacker-controlled applications to victims).”

It is worth noting that the RDP campaign was previously documented by CERT-UA, Amazon Web Services, and Microsoft in October 2024, and then by Trend Micro in December. CERT-UA tracks the activity under the name UAC-0215, but others are attributed to the hacking group APT29, sponsored by the Russian state.

The attack is also well known to use an open source tool called PYRDP to automate malicious activities such as file removal and clipboard capture that contain potentially sensitive data such as passwords.

“The campaign allows attackers to read the victim’s drive, steal files, capture clipboard data (including passwords), and retrieve victim environment variables,” GTIG said in a report Monday. “The main objectives of UNC5837 seem to be espionage and file stealing.”

Over the past few months, phishing campaigns have also been observed distributing Legion Loader (Satacom) using fake Captchas and Cloudflare Turnstile.

Cybersecurity

“The initial payload spreads through a drive-by download infection that begins when the victim searches for a specific document and is seduced by a malicious website,” Netskope Threat Labs said. “The downloaded document includes Captcha, which, when the victim clicks, redirects to CloudFlare Turnstile Captcha and ultimately redirects to the notification page.”

This page encourages users to allow notifications on the site. The victim is then redirected to a second CloudFlare TurnStile Captcha.

In reality, the attack paves the way for delivery and execution of the MSI installer files responsible for starting the Legion Loader. This will take a series of steps to download and run the interim PowerShell script, and eventually add the Rogue browser extension to your browser.

The PowerShell script will exit the browser session to enable the extension, turn on developer mode in Settings, and reissue the browser. The ultimate goal is to capture a wide range of sensitive information and eliminate it to the attacker.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMeta introduces restricted teen accounts to Facebook and Messenger
Next Article SOC Agent AI
user
  • Website

Related Posts

New supply chain malware operations hit the NPM and PYPI ecosystems, targeting millions around the world

June 8, 2025

Malicious browser extensions will infect 722 users across Latin America since early 2025

June 8, 2025

The new Atomic Macos Stealer campaign targets Apple users by exploiting Clickfix

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

How to watch Apple’s WWDC 2025 Keynote

In WWDC 25, AI must compensate with developers after AI shortage and lawsuits

New supply chain malware operations hit the NPM and PYPI ecosystems, targeting millions around the world

Malicious browser extensions will infect 722 users across Latin America since early 2025

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Should the government ban AI-generated humans to stop the collapse of social trust?

AB will be released at Binance -Tech Startups

Top 10 Startups and Tech Funding News for the Weekly Ends June 6, 2025

Order openai to keep all chatgpt logs including deleted temporary chats, API requests

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.