Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

OpenAI’s “Embarrassing” Mathematics | Tech Crunch

Whitehouse is already one of the most blocked accounts on Bluesky

Europol dismantles SIM farm network running 49 million fake accounts worldwide

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CERT-UA warns against C# malware attacks that drive HTA using court subpoena lures
Identity

CERT-UA warns against C# malware attacks that drive HTA using court subpoena lures

userBy userAugust 6, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 6, 2025Ravi LakshmananCyber Spy/Malware

HTA distribution C# Malware

The Ukrainian Computer Emergency Response Team (CERT-UA) has warned of cyberattacks carried out by threat actors called UAC-0099, targeting domestic government agencies, defense forces and businesses in the Defense Industrial Parks.

Attacks that use phishing email as an initial compromise vector are used to provide malware families such as MatchBoil, MatchWok, and Dragstare.

UAC-0099 was first published by its agency in June 2023 and has a history of targeting Ukrainian entities for espionage purposes. Previous attacks have been observed that leverage security flaws in Winrar software (CVE-2023-38831, CVSS score: 7.8) to propagate malware called LonePage.

The latest infectious disease chains use email lures related to court summoning to seduce recipients to click on a link that is shortened using URL shortening services like Cuttly. These links are sent via the ukr.net email address and refer to a double archive file containing HTML application (HTA) files.

Cybersecurity

Running the HTA payload triggers the launch of obfuscated Visual Basic Script files that run a loader called MatchBoil, a C#-based program designed to create scheduled tasks for continuation and ultimately drop additional malware on the host.

This includes a backdoor called Matchwok and a steeler named Dragstare. Additionally, MatchWok written using the C# programming language can run PowerShell commands and pass the results of the execution to a remote server.

Meanwhile, Dragstare is equipped to match the “.txt “, ” .ovpn “) in a particular list of system information, data from web browsers, and extensions (“.docx”, “.doc”, “.xls”, “.txt”, “.ovpn”, “.rdp”, “.txt”, “.pdf”). PowerShell commands received from servers controlled by the attacker.

HTA distribution C# Malware

The disclosure details the use of six new malware tools designed for stealth, persistence and lateral movement, just over a month after ESET published a detailed report cataloguing Gamallen’s “relentless” spearfussing attacks on Ukrainian entities in 2024 –

Pterodespair, a Powershell reconnaissance tool that collects diagnostic data for malwells of previously deployed malware, Pterotickle, and PowerShell weapons devices targeting Python applications that have been converted to executables on fixed and removable drives, promote lateral movement by injecting code that is likely to be using Pteropsographin using Pteropsographin. Create an encrypted communication channel for scheduled tasks and payload delivery via the Telegraph API Pterostew, a VBScript downloader similar to Pterosand and Pterorisk. powershell file steeler is similar to pteropsdoor, but similar to stolen files stolen by dropbox

Identity Security Risk Assessment

“The activity of Gammerderson’s spears increased significantly in the second half of 2024,” said security researcher Zoltan Rusnak. “The campaign usually lasted 1-5 days in a row, with emails containing malicious archives (RAR, ZIP, 7Z) or XHTML files employing HTML smuggling technology.”

Attacks often result in the delivery of malicious HTA or LNK files that run embedded VBScript downloaders such as Pteropsdoor, Pterolnk, Pterovdoor, and Pteropsload, as well as malicious HTA or LNK files that run embedded VBScript downloaders such as Pterosand.

Other notable aspects of threat actor merchants alongside Russia include the use of first-flux DNS technology and their reliance on legitimate third-party services such as Telegram, Telegraph, Codeberg, and Cloudflare tunnels.

“Despite its limitations on observable capabilities and abandoning old tools, Gameardon remains a key threat actor thanks to its continued innovation, aggressive spinning campaigns and ongoing efforts to avoid detection,” ESET said.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAI Is Transforming Cybersecurity Adversarial Testing
Next Article Resolves consistency of certification for bio-based products
user
  • Website

Related Posts

Europol dismantles SIM farm network running 49 million fake accounts worldwide

October 19, 2025

New .NET CAPI backdoor targets Russian car and e-commerce companies via phishing ZIPs

October 18, 2025

Silver Fox spreads Winos 4.0 attack to Japan and Malaysia via HoldingHands RAT

October 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

OpenAI’s “Embarrassing” Mathematics | Tech Crunch

Whitehouse is already one of the most blocked accounts on Bluesky

Europol dismantles SIM farm network running 49 million fake accounts worldwide

Wikipedia says AI search summaries and social videos are causing traffic decline

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.